


default search action
4th Q2SWinet 2008: Vancouver, British Columbia, Canada
- Albert Y. Zomaya, Matteo Cesana:

Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008. ACM 2008, ISBN 978-1-60558-237-5
Quality of service in wireless broadband networks I
- Gabriele Cecchetti

, Anna Lina Ruscelli
:
Performance evaluation of real-time schedulers for HCCA function in IEEE 802.11e wireless networks. 1-8 - T. H. Szymanski:

Throughput and QoS optimization in nonuniform multichannel wireless mesh networks. 9-19 - Peng Jiang, Yasar Ahmet Sekercioglu

:
A dynamic call admission control scheme for optimization with QoS provisioning in multiclass cellular networks. 19-26
Security architectures for wireless/wired access networks
- Rodolphe Marques, André Zúquete

:
Fast, secure handovers in 802.11: back to the basis. 27-34 - Fabio Martignon, Stefano Paris, Antonio Capone

:
MobiSEC: a novel security architecture for wireless mesh networks. 35-42 - Mirco Marchetti

, Michele Colajanni
:
Adaptive traffic filtering for efficient and secure IP-mobility. 43-50 - Khalil El-Khatib:

The cost of protecting privacy in multimedia applications. 51-54
Quality of service in wireless broadband networks II
- Guntur Ravindra, Joseph Thaliath, Ian D. Chakeres:

In-network optimal rate reduction for packetized MPEG video. 55-62 - Syed Zubair Ahmad, Muhammad Abdul Qadir

, Mohammad Saeed Akbar:
A distributed resource management scheme for load-balanced QoS provisioning in heterogeneous mobile wireless networks. 63-70 - Soon-Young Oh, Gustavo Marfia

, Mario Gerla:
ProbeCast: MANET admission control via probing. 71-78 - Nityananda Sarma

, Sukumar Nandi
:
A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks. 79-82
Security, trust and reputation in wireless ad hoc networks
- Marie Elisabeth Gaup Moe

, Bjarne E. Helvik
, Svein J. Knapskog:
TSR: trust-based secure MANET routing using HMMs. 83-90 - Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann

:
Trust transferability among similar contexts. 91-97 - Friederike Klan, Mathias Röhl, Birgitta König-Ries, Adelinde M. Uhrmacher:

Using context information to evaluate cooperativeness. 98-105 - Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho:

Secure authentication and management scheme for RFID. 106-110
Poster contributions on QoS and security for wireless networks
- Thomas Gamer, Lars Völker

, Martina Zitterbart:
Differentiated security in wireless mesh networks. 111-112 - Janet Light, Deepika David:

An efficient security algorithm in mobile computing for resource constrained mobile devices. 113-114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














