Musfiqur Rahman | University of South Carolina (original) (raw)
Uploads
Papers by Musfiqur Rahman
Telecommunications Policy, Jan 1, 2003
Proceedings of the 14th …, Jan 1, 2008
Communications Magazine, IEEE, Jan 1, 2002
IEEE Communications Magazine, Jan 1, 2007
Abstract Broadband wireless access networks based on WiMAX can provide backhaul support for mobil... more Abstract Broadband wireless access networks based on WiMAX can provide backhaul support for mobile WiFi hotspots. We consider an integrated WiMAX/WiFi network for such an application where the licensed WiMAX spectrum is shared by the WiFi access points/ ...
Eurasip journal on applied signal processing, Jan 1, 2006
Proceedings of the 7th ACM …, Jan 1, 2007
… 2007. 26th IEEE …, Jan 1, 2007
Proceedings of the 20th International Joint …, Jan 1, 2007
International Journal of Sensor Networks, Jan 1, 2008
Location-and context- …, Jan 1, 2007
IEEE/ACM Transactions on Networking ( …, Jan 1, 2006
… in Medicine and Biology Society, 2005. …, Jan 1, 2005
World of Wireless …, Jan 1, 2005
Two types of applications use indoor positioning: ser-vices linked with mobility, such as guided ... more Two types of applications use indoor positioning: ser-vices linked with mobility, such as guided tour or meeting systems, and the active security of wireless network which locates intrusive unauthorized mobile terminals. Indoor po-sitioning cannot be managed by a geostationnary system ...
Proceedings of the 8th …, Jan 1, 2010
Communications of the ACM, Jan 1, 2005
WiFi attack vectors. ... The security risks of WiFi connectivity have been established---the reas... more WiFi attack vectors. ... The security risks of WiFi connectivity have been established---the reasons for these risks of intrusion are not as well understood. Risk; Mathematical analysis; Intrusion; Security; Vectors(mathematics); 90 Computing Milieux(General)(CI).
… and Networks, 2007. SECON'07. 4th …, Jan 1, 2007
Papers presented at the 2005 workshop on …, Jan 1, 2005
Modeling movements of users is important for simulat-ing wireless networks, but current models of... more Modeling movements of users is important for simulat-ing wireless networks, but current models often do not reflect real movements. Using real mobility traces, we can build a mobility model that reflects reality. In build-ing a mobility model, it is important to note that while the ...
IEEE Transactions on …, Jan 1, 2010
Mobile Multimedia Consortium Paper, University of …, Jan 1, 2004
Telecommunications Policy, Jan 1, 2003
Proceedings of the 14th …, Jan 1, 2008
Communications Magazine, IEEE, Jan 1, 2002
IEEE Communications Magazine, Jan 1, 2007
Abstract Broadband wireless access networks based on WiMAX can provide backhaul support for mobil... more Abstract Broadband wireless access networks based on WiMAX can provide backhaul support for mobile WiFi hotspots. We consider an integrated WiMAX/WiFi network for such an application where the licensed WiMAX spectrum is shared by the WiFi access points/ ...
Eurasip journal on applied signal processing, Jan 1, 2006
Proceedings of the 7th ACM …, Jan 1, 2007
… 2007. 26th IEEE …, Jan 1, 2007
Proceedings of the 20th International Joint …, Jan 1, 2007
International Journal of Sensor Networks, Jan 1, 2008
Location-and context- …, Jan 1, 2007
IEEE/ACM Transactions on Networking ( …, Jan 1, 2006
… in Medicine and Biology Society, 2005. …, Jan 1, 2005
World of Wireless …, Jan 1, 2005
Two types of applications use indoor positioning: ser-vices linked with mobility, such as guided ... more Two types of applications use indoor positioning: ser-vices linked with mobility, such as guided tour or meeting systems, and the active security of wireless network which locates intrusive unauthorized mobile terminals. Indoor po-sitioning cannot be managed by a geostationnary system ...
Proceedings of the 8th …, Jan 1, 2010
Communications of the ACM, Jan 1, 2005
WiFi attack vectors. ... The security risks of WiFi connectivity have been established---the reas... more WiFi attack vectors. ... The security risks of WiFi connectivity have been established---the reasons for these risks of intrusion are not as well understood. Risk; Mathematical analysis; Intrusion; Security; Vectors(mathematics); 90 Computing Milieux(General)(CI).
… and Networks, 2007. SECON'07. 4th …, Jan 1, 2007
Papers presented at the 2005 workshop on …, Jan 1, 2005
Modeling movements of users is important for simulat-ing wireless networks, but current models of... more Modeling movements of users is important for simulat-ing wireless networks, but current models often do not reflect real movements. Using real mobility traces, we can build a mobility model that reflects reality. In build-ing a mobility model, it is important to note that while the ...
IEEE Transactions on …, Jan 1, 2010
Mobile Multimedia Consortium Paper, University of …, Jan 1, 2004