ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Symposium, 2005 Wireless Telecommunications
Latest Publications
TOTAL DOCUMENTS
52
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By IEEE
0780388569
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
An architecture of security control in sensor networks
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524798
◽
2006
◽
Cited By ~ 2
Author(s):
Xian Liu
Keyword(s):
Sensor Networks
◽
Security Control
Download Full-text
Monitoring and management solutions for 3G/4G wireless mobile networks
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524792
◽
2006
◽
Cited By ~ 1
Author(s):
E. Wallenius
◽
T. Hamalainen
◽
H. Helantera
◽
O. Alanen
Keyword(s):
Mobile Networks
◽
Wireless Mobile Networks
◽
4G Wireless
◽
Wireless Mobile
Download Full-text
Lightweight packet authentication in IEEE 802.11
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524797
◽
2006
◽
Author(s):
KeunSoon Lee
◽
HyoJin Kim
◽
JooSeok Song
Keyword(s):
Ieee 802.11
Download Full-text
Optimal pricing for broadband wireless internet access service
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524793
◽
2006
◽
Author(s):
Seungjae Shin
◽
M.B.H. Weiss
Keyword(s):
Internet Access
◽
Optimal Pricing
◽
Wireless Internet
◽
Broadband Wireless
◽
Wireless Internet Access
◽
Access Service
Download Full-text
A sensitivity analysis approach to the optimal policy range of the resource access control in wireless systems
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524772
◽
2006
◽
Author(s):
Huan Chen
◽
Chih-Chuan Cheng
◽
Mei-Hsiu Chi
◽
Hsi-Hsun Yeh
Keyword(s):
Sensitivity Analysis
◽
Access Control
◽
Optimal Policy
◽
Wireless Systems
◽
Analysis Approach
◽
Resource Access
Download Full-text
Transient MAC address scheme for untraccability and dos attack resiliency on wireless network
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524759
◽
2006
◽
Author(s):
D. Inoue
◽
R. Nomura
◽
M. Kuroda
Keyword(s):
Wireless Network
◽
Dos Attack
Download Full-text
A key pre-distribution scheme for wireless sensor networks
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524795
◽
2006
◽
Cited By ~ 4
Author(s):
A. Price
◽
K. Kosaka
◽
S. Chatterjee
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Distribution Scheme
Download Full-text
Energy-delay analysis of wireless networks over rayleigh fading channel
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524787
◽
2006
◽
Author(s):
Shih Yu Chang
Keyword(s):
Wireless Networks
◽
Fading Channel
◽
Rayleigh Fading
◽
Rayleigh Fading Channel
◽
Delay Analysis
Download Full-text
Wireless load sharing with heterogeneous services and adaptive placement
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524768
◽
2006
◽
Cited By ~ 4
Author(s):
S.J. Lincke
Keyword(s):
Load Sharing
◽
Heterogeneous Services
Download Full-text
High performance transmission using a combined pulse position and differential multi-pulse modulation in transmit-reference ultra-wideband (tr-uwb) communication
Symposium, 2005 Wireless Telecommunications
◽
10.1109/wts.2005.1524782
◽
2006
◽
Cited By ~ 1
Author(s):
J. Sumethnapis
◽
K. Araki
Keyword(s):
High Performance
◽
Ultra Wideband
◽
Pulse Modulation
◽
Transmit Reference
◽
Uwb Communication
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close