Sciweavers

215 search results - page 33 / 43
» A Mobile Ambients-Based Approach for Network Attack Modellin...
Sort
View
ADHOC
2010
317views more  ADHOC 2010»
13 years 4 months ago
Simple ant routing algorithm strategies for a (Multipurpose) MANET model
A Mobile Ad-hoc Network has limited and scarce resources and thus routing protocols in such environments must be kept as simple as possible. The Simple Ant Routing Algorithm (SARA...
Fernando Correia, Teresa Vazão
NETGAMES
2004
ACM
14 years 1 months ago
Lightweight QoS-support for networked mobile gaming
In this paper, we present an approach to provide Quality of Service (QoS) for networked mobile gaming. In order to examine the QoS requirements of mobile games, we ported a simple...
Marcel Busse, Bernd Lamparter, Martin Mauve, Wolfg...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 9 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
AINA
2008
IEEE
14 years 2 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
MOBIHOC
2007
ACM
14 years 7 months ago
Scalable routing in delay tolerant networks
The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout...
Cong Liu, Jie Wu