Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEEE 802.11 Standards
biblio
Bandwidth Prediction on a WiMAX Network
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
Mobile communication
wireless
WiMAX network
WiMax
RSSI
receive signal strength indicator
prediction
next-generation networking technology
next generation networks
Bandwidth
IEEE 802.16 standard
IEEE 802.11 Standards
high-speed network access
Educational institutions
Correlation
CINR
carrier to interference plus noise ratio
bandwidth prediction
1536086
biblio
VirtueMAN: A software-defined network architecture for WiFi-based metropolitan applications
Submitted by BrandonB on Tue, 05/05/2015 - 10:22am
QoS
wireless LAN
wireless access point
WiFi-based metropolitan application
VirtueMAN
telecommunication traffic
software-defined network architecture
software defined networking
security
SDN-based network architecture
quality of service
authentication
Protocols
Mobile communication
IP-independent forwarding scheme
intranetwork distributed cross-layer traffic control protocol
internet
IEEE 802.11 Standards
Heart beat
distributed network-wide controller
configurable user access control
authorisation
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
biblio
Accurate WiFi Based Localization for Smartphones Using Peer Assistance
Submitted by BrandonB on Mon, 05/04/2015 - 11:58am
peer assisted localization approach
wireless LAN
WiFi signature map
WiFi fingerprint localization
WiFi based localization method
testing
smartphone
smart phones
Servers
radionavigation
peer phones
Accuracy
Peer Assisted Localization
location based features
indoor radio
indoor localization
IEEE 802.11 Standards
Distance measurement
battery lifetime
Acoustics
acoustic ranging estimates
biblio
Selfish insider attacks in IEEE 802.11s wireless mesh networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
Ad hoc networks
IEEE 802.11 Standards
IEEE 802.11s wireless mesh networks
Logic gates
Protocols
quality of service
Routing
selfish insider attacks
telecommunication security
wireless LAN
wireless mesh networks
biblio
Energy efficient techniques in Wireless Mesh Network
Submitted by BrandonB on Fri, 05/01/2015 - 9:45am
Logic gates
WMN
wireless network architecture
wireless mesh networks
wireless mesh network
Wireless communication
Throughput
smart devices
Routing
bandwidth hungry applications
IEEE 802.11 Standards
Evolution
energy efficient techniques
energy efficient network
Energy Efficiency
energy conservation
energy aware techniques
biblio
Resilient wireless communication networking for Smart grid BAN
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
smart grid BAN
network security
network topology
Redundancy
resilience
resilient wireless communication networking
round trip time
RTT
sensor placement
Single-hop network
network reliability
Smart Grids
smart meters
smart power grids
telecommunication network reliability
telecommunication network topology
telecommunication security
Wireless communication
wireless LAN
wireless technology
hybrid deployment
building area network
control centre
demand response function
distribution level
DR communication
end to end delay
home area network
home automation
home networks
backbone networks
IEEE 802.11 communication technology
IEEE 802.11 Standards
Infrastructure mode
infrastructure mode smart meter network
infrastructure single hop topology
mesh multiple hop topology
Multi-hop mesh network
network failure
biblio
Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:42am
radio aware optimized link state routing
WMN
wireless mesh networks
topology control
telecommunication network topology
telecommunication control
security mechanisms
security
Routing protocols
Routing Protocol
Routing
Cryptography
network simulator-3 simulations
IEEE 802.11 Standards
identity based encryption
IBE-RAOLSR protocols
IBE
hello messages
elliptic curve digital signature algorithm
ECDSA-RAOLSR protocols
digital signatures
delays
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
1
2
next ›
last »