Results 241 to 250 of about 186,928 (291)
Some of the next articles are maybe not open access.
IEEE International Conference on Computer Systems and Applications, 2006., 2006
The video game market is currently the fastest growing form of E-entertainment. Today’s players want more from their experience, like massively multiplayer online games and the ability to play anytime/anywhere using cell phones, PDAs, and consoles. For developing multiplayer online games for cell phones, we report an effort performed at the COMSATS ...
Aqib Mumtaz, Faisal Tehseen Shah
openaire +1 more source
The video game market is currently the fastest growing form of E-entertainment. Today’s players want more from their experience, like massively multiplayer online games and the ability to play anytime/anywhere using cell phones, PDAs, and consoles. For developing multiplayer online games for cell phones, we report an effort performed at the COMSATS ...
Aqib Mumtaz, Faisal Tehseen Shah
openaire +1 more source
Proceedings of the 3rd international conference on Mobile systems, applications, and services, 2005
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used during the pairing process. We then describe the cracking speed we can achieve through three optimizations methods.
Yaniv Shaked, Avishai Wool
openaire +1 more source
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used during the pairing process. We then describe the cracking speed we can achieve through three optimizations methods.
Yaniv Shaked, Avishai Wool
openaire +1 more source
2005 IEEE Conference on Emerging Technologies and Factory Automation, 2006
This paper describes a preliminary work carried on to assess the use of Bluetooth technology to transport MIDI data streams. The proposed approach is based on the well-known Bluetooth serial port profile. Although the music field motivated the work, the results are significant for the use of the profile in time critical applications such as industrial ...
Paulo Bartolomeu +4 more
openaire +1 more source
This paper describes a preliminary work carried on to assess the use of Bluetooth technology to transport MIDI data streams. The proposed approach is based on the well-known Bluetooth serial port profile. Although the music field motivated the work, the results are significant for the use of the profile in time critical applications such as industrial ...
Paulo Bartolomeu +4 more
openaire +1 more source
Cluster Computing, 2005
Bluetooth polling, also referred to as Bluetooth MAC scheduling or intra-piconet scheduling, is the mechanism that schedules the traffic between the participants in a Bluetooth network. Hence, this mechanism is highly determining with respect to the delay packets experience in a Bluetooth network.
Rachid Ait Yaiz, Geert J. Heijenk
openaire +1 more source
Bluetooth polling, also referred to as Bluetooth MAC scheduling or intra-piconet scheduling, is the mechanism that schedules the traffic between the participants in a Bluetooth network. Hence, this mechanism is highly determining with respect to the delay packets experience in a Bluetooth network.
Rachid Ait Yaiz, Geert J. Heijenk
openaire +1 more source
The Bluetooth honeypot project
Wireless Telecommunications Symposium 2012, 2012Bluetooth technology and the inherent security risks it introduces into the workplace can no longer be disregarded. A failure to understand or adequately safeguard the organization from Bluetooth threats increases the likelihood that unauthorized access to sensitive data will occur.
Ashley L. Podhradsky +2 more
openaire +1 more source
IEEE Personal Communications, 2000
A few years ago it was recognized that the vision of a truly low-cost, low-power radio-based cable replacement was feasible. Such a ubiquitous link would provide the basis for portable devices to communicate together in an ad hoc fashion by creating personal area networks which have similar advantages to their office environment counterpart, the local ...
openaire +1 more source
A few years ago it was recognized that the vision of a truly low-cost, low-power radio-based cable replacement was feasible. Such a ubiquitous link would provide the basis for portable devices to communicate together in an ad hoc fashion by creating personal area networks which have similar advantages to their office environment counterpart, the local ...
openaire +1 more source
Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, 2003
We propose a Bluetooth location network (BLN) for location-aware or context-driven mobile networks, such as m-commerce networks or e-museums. We assume that, in any of those scenarios, there exist service servers that need to know user location in real-time, to send context-oriented information to user handhelds when necessary.
Francisco J. González-Castaño +1 more
openaire +1 more source
We propose a Bluetooth location network (BLN) for location-aware or context-driven mobile networks, such as m-commerce networks or e-museums. We assume that, in any of those scenarios, there exist service servers that need to know user location in real-time, to send context-oriented information to user handhelds when necessary.
Francisco J. González-Castaño +1 more
openaire +1 more source
2005
We discuss ways to enhance the location privacy of Bluetooth. The principal weakness of Bluetooth with respect to location privacy lies in its disclosure of a device’s permanent identifier, which makes location tracking easy. Bluetooth’s permanent identifier is often disclosed and it is also tightly integrated into lower layers of the Bluetooth stack ...
Ford-Long Wong, Frank Stajano
openaire +1 more source
We discuss ways to enhance the location privacy of Bluetooth. The principal weakness of Bluetooth with respect to location privacy lies in its disclosure of a device’s permanent identifier, which makes location tracking easy. Bluetooth’s permanent identifier is often disclosed and it is also tightly integrated into lower layers of the Bluetooth stack ...
Ford-Long Wong, Frank Stajano
openaire +1 more source
Bluetooth in wireless communication
IEEE Communications Magazine, 2002Bluetooth is a method for data communication that uses short-range radio links to replace cables between computers and their connected units. Industry-wide Bluetooth promises very substantial benefits for wireless network operators, end workers, and content developers of exciting new applications.
K. V. S. S. S. S. Sairam +2 more
openaire +1 more source

