Filters








4,783 Hits in 3.0 sec

Networking Support For Mobile Computing

Upkar Varshney
1999 Communications of the Association for Information Systems  
With increasing use of small portable computers, wireless networks and satellites, a trend to support "computing on the move" has emerged.  ...  However the mobile user still expects uninterrupted network access and the ability to run some networked applications.  ...  The main issues in WLANs are channel allocation, frequency of operation, and interference and security. We briefly discuss these issues and then examine two emerging standards for WLANs.  ... 
doi:10.17705/1cais.00101 fatcat:o45bhhpvbvc27cmjtvk5zzcy7u

Networking and Performance Issues of Personal Mobile Communications

H. Ahmadi, R. Jain, P.J. Kuehn, V.O.K. Li
1997 IEEE Journal on Selected Areas in Communications  
On network architecture, Cheng and Holtzman propose a wireless ATM network architecture and related protocol design in their paper, "Wireless Intelligent ATM Network and Protocol Design for Future Personal  ...  Last but not least, Samfat and Molva in their paper, "IDAMN: An Intrusion Detection Architecture for Mobile Networks," address the important issue of network security.  ... 
doi:10.1109/jsac.1997.622904 fatcat:hsb2ymugcjcknlzlbvlsx3lyqm

A Good Wireless Technologies Reference

B. Bing
2004 IEEE Distributed Systems Online  
The wireless subject is an intense research area owing to the medium's inherent difficulties and the increasing demand for better and cheaper services.  ...  Wireless Networks provides an in-depth discussion of these technologies and also briefly looks at other emerging technologies such as wireless ad hoc networks and wireless local loops.  ...  Also, the authors should have expanded their discussion of security issues (Chapter 12) to include solutions for improving wireless security.  ... 
doi:10.1109/mdso.2004.1 fatcat:piffjlx3vfep5e4eg6rdaarhei

Cryptographic security Techniques for wireless networks

Danai Patiyoot, S. J. Shepherd
1999 ACM SIGOPS Operating Systems Review  
Also a proposal for future research into security techniques for wireless ATM networks included.  ...  Various conclusions are drawn from existing security networks and proposed in new wireless ATM network security.  ...  Section three is the proposal of security for wireless ATM network. Recommendations for future research into wireless ATM security is laid out in Section four. Conclusion is made in Section five.  ... 
doi:10.1145/311094.311104 fatcat:glavbbeyy5cjvhi73z2pbnqm5y

Networks and control [Guest Editorial]

2001 IEEE Control Systems  
We include two articles in this area, focusing respectively on new research topics in wireless networks and congestion control for asynchronous transfer mode (ATM) networks.  ...  These articles cover stability issues, application issues, and several standard bus protocols. All five articles discuss various new research areas for control engineers.  ...  We include two articles in this area, focusing respectively on new research topics in wireless networks and congestion control for asynchronous transfer mode (ATM) networks.  ... 
doi:10.1109/mcs.2001.898789 fatcat:wxbwg73vzvge5abeqtno5d7qwm

Secured Banking using Multilevel Authentication by Face Recognition and SIM Card Verification for ATMs

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Security in ATM centers has become the need of the hour. Now-a-days we hear lots of news about Money laundering from ATMs by using fraudulent cards.  ...  To thwart this situation and to guarantee a secured and safe transaction we have proposed a multilevel authentication for allowing access to the customer's account.In our prototype the first level of authentication  ...  GSM MODEM: It is a wireless modem which requires a wireless network to function. A wireless modem is similar to dial-up modem.  ... 
doi:10.35940/ijitee.b7062.019320 fatcat:l2mhoqnotbenrngkg7et74hwuq

Performance evaluation of a fuzzy-based CAC scheme for wireless cellular networks: a case study considering priority of on-going connections

Gjergji Mino, Leonard Barolli, Fatos Xhafa, Arjan Durresi, Akio Koyama
2010 International Journal of Business Intelligence and Data Mining  
Performance evaluation of two fuzzy-based cluster head selection systems for wireless sensor networks,"  ...  • PI, Scalable Broadcast Protocols for Wireless Sensor Networks, NSF, $12,000, 2005-06.  ...  Arjan Durresi, Mimoza Durresi, Leonard Barolli, "Security of Mobile and Heterogeneous Wireless Networks in Battlefields," in Proceedings of The International Workshop on Next Generation of Wireless and  ... 
doi:10.1504/ijbidm.2010.033362 fatcat:47a7svmreres7ckfzclgoucnhq

A computational asset vulnerability model for the strategic protection of the critical infrastructure

Richard White, Terrance Boult, Edward Chow
2014 International Journal of Critical Infrastructure Protection  
Explored design issues in the con-nection management and the resource management for Gigabit ATM networks. Verified design solutions on an experimental broadband ATM network prototype.  ...  . • WINPLAN: Wireless Information Networks Planning Project-Principal Investigator for the with $35,260 grant from CASI, sponsored by Omnipoint, 7/98-9/99.  ... 
doi:10.1016/j.ijcip.2014.06.002 fatcat:wupejmictrfthp22jzeknitwxu

Supporting User Mobility [chapter]

Martin G. Brown
1996 Mobile Communications  
The availability of wireless network connections to laptop computers and PDA's has created interest in the issues surrounding mobile computing.  ...  Distributed system services are needed to support the locating of people, equipment and software objects, and, especially for mobile multimedia applications, network transport protocols which can adapt  ...  The security issues related to mobility will not be considered here.  ... 
doi:10.1007/978-0-387-34980-0_8 fatcat:hfgpm7pogjg3vbtayhrjugnaxy

Applying switching and multiple access model for reducing packet loss and network overheads in watm

Saif Mohammed Ali, Haider Mshali, Amer S. Elameer, Mustafa Musa Jaber, Sura Khalil Abd
2021 Eastern-European Journal of Enterprise Technologies  
As an effectual simple wireless equivalent created in the telecommunications (telephone) industry, Wireless Asynchronous Transfer Mode (WATM) is utilized to stream unified traffics like video, data, and  ...  Effective WATM data transmission requires an extensive array of designs, techniques used for control, and simulation methodologies.  ...  The presented procedure aids in the resolution of overload to the network and issues on congestion in wireless networks.  ... 
doi:10.15587/1729-4061.2021.249474 fatcat:4j6w774lwvc7dp623bpot42al4

QoS and QoE in the Next Generation Networks and Wireless Networks [chapter]

Pascal Lorenz
2014 Communications in Computer and Information Science  
(Mobility enhanced ATM switches). • Mobility specific: Signaling, Location management, mobility management, security management and connection admission control • Mobility specific issues should be taken  ...  -all IP with terarouter -Use the networks providing QoS (ATM, MPLS, …):VC, switching environment • 3 rd generation: common architecture for wire and wireless communications • Growth of the networks  ... 
doi:10.1007/978-3-662-45945-4_1 fatcat:3oirszkftzh67h7uov454fz7eq

QoS and QoE in the Next Generation Networks and Wireless Networks [chapter]

Pascal Lorenz
2014 Communications in Computer and Information Science  
(Mobility enhanced ATM switches). • Mobility specific: Signaling, Location management, mobility management, security management and connection admission control • Mobility specific issues should be taken  ...  -all IP with terarouter -Use the networks providing QoS (ATM, MPLS, …):VC, switching environment • 3 rd generation: common architecture for wire and wireless communications • Growth of the networks  ... 
doi:10.1007/978-3-662-44788-8_1 fatcat:u2vwk3cy7bddvjobjvaem75djq

SmaCk: Smart Knock Security Drawer Based on Knock-Pattern using Piezo-electric Effect

Alvin S. Alon
2020 International Journal of Emerging Trends in Engineering Research  
In the constant advancement of technology, protection of one's property becomes a major concern for each individual.  ...  This device also established a strong security based on the secret knock pattern security system.  ...  ACKNOWLEDGEMENT The researchers would like to thank the Technological Institute of the Philippines' Mr.Suave High-Performance Computing Laboratory for allowing them to used their computing facilities.  ... 
doi:10.30534/ijeter/2020/16822020 fatcat:ycctsyrurfbnpf374s64jiezta

Transport architecture evolution in UMTS/IMT-2000 cellular networks

Barani Subbiah, Yrjo Raivio
2000 International Journal of Communication Systems  
The new ATM standard, ATM adaptation layer type 2 (AAL2) and its applicability for transporting compressed speech in an ATM based cellular network is described.  ...  In this scenario, IWF is needed in the CN for ISDN/PSTN and ATM networks. This is a natural step forward from the previous scenarios if an integrated network is the ultimate goal.  ...  The convergence of telecom, datacomm and wireless networks have spurred new applications and services, interoperability and mobility issues in wireless networks.  ... 
doi:10.1002/1099-1131(200008)13:5<371::aid-dac472>3.0.co;2-n fatcat:fxtk3nv62rccdgqoumwdwxzwfq

Enabling next generation airborne communications [Guest Editorial]

Aradhana Narula-Tam, Kamesh Namuduri, Serge Chaumette, Domenico Giustiniano
2014 IEEE Communications Magazine  
modern communications technologies, and an upgrade from conventional ATM systems toward Future Communications Infrastructure (FCI) for ATM.  ...  She has served as session and track chair for MILCOM, and co-authored over 30 papers in the areas of mobile communications, wireless networking, satellite communication systems, and optical networks.  ... 
doi:10.1109/mcom.2014.6815899 fatcat:xtj6uuwpavblfla2rdfbvl2a54
« Previous Showing results 1 — 15 out of 4,783 results