Results 161 to 170 of about 3,917 (219)
Some of the next articles are maybe not open access.
Computer Networks, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Aad, Imad, Castelluccia, Claude
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Aad, Imad, Castelluccia, Claude
openaire +1 more source
Green WLANs: On-Demand WLAN Infrastructures
Mobile Networks and Applications, 2008Enterprise wireless local area networks (WLANs) that consist of a high-density of hundreds to thousands of access points (APs) are being deployed rapidly in corporate offices and university campuses. The primary purpose of these deployments is to satisfy user demands for high bandwidth, mobility, and reliability.
Amit P. Jardosh +5 more
openaire +1 more source
Proceedings of the 8th workshop on Multimedia and security, 2006
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity of a prototypical implementation of both approaches are described and discussed.
Christian Krätzer +3 more
openaire +1 more source
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity of a prototypical implementation of both approaches are described and discussed.
Christian Krätzer +3 more
openaire +1 more source
XRDS: Crossroads, The ACM Magazine for Students, 2013
A look back at wireless technology through the years.
openaire +1 more source
A look back at wireless technology through the years.
openaire +1 more source
WLAN-centric authentication in integrated GPRS-WLAN networks
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003A SIM-based authentication is preferable for GPRS operators for the integrated GPRS-WLAN networks. It requires WLAN systems process the GPRS-based authentication and transport the GPRS authentication messages back to the GPRS networks. This paper presents an alternative WLAN-centric approach based on the perspective of WLAN providers. The proposed WLAN-
null Ming-Chia Jiang +2 more
openaire +1 more source
Project-WLAN: a longitudinal study of WLAN experiments
International Journal of Mobile Communications, 2006With the improved cost and performance of Wireless Local Area Network (WLAN) systems and the growing availability of standards-based solutions, WLAN services and acceptance have mushroomed in both research and application domains. In the technological world as well as this paper, most concerns surround the security and quality of service of WLAN.
openaire +1 more source
Energy efficient RoF based centralized enterprise WLAN (CE-WLAN)
IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), 2015In 802.11 standard, meager effort has been invested towards devising energy efficient WLAN communication. Especially with the massive deployment of centralized enterprise WLAN (CE-WLAN), in indoor networks, a lot of access points (APs) are densely packed for increasing the capacity offered.
openaire +1 more source
WLAN system trends and the implications for WLAN RFICs
2004 IEE Radio Frequency Integrated Circuits (RFIC) Systems. Digest of Papers, 2004Six trends in WLAN systems are described. For each trend, the implications for WLAN RFICs are described. The six trends include increasing levels of integration, dual band operation, large percentage tuning ranges, very high data rates, long range capability, and PA efficiency enhancements. Potential solutions to these issues are examined.
openaire +1 more source
Suvremeni promet, 2011
Discussing the issue of self-radicalization and home grown terrorism, I hold that there are two open questions: why and how does this happen? To the question why- the competent people to give answer are sociologists, communicologists, politologs and others, while to the question how this can be carried out in modern world, the answer should be given by
openaire
Discussing the issue of self-radicalization and home grown terrorism, I hold that there are two open questions: why and how does this happen? To the question why- the competent people to give answer are sociologists, communicologists, politologs and others, while to the question how this can be carried out in modern world, the answer should be given by
openaire

