Sciweavers

206 search results - page 30 / 42
» Adaptive routing with stale information
Sort
View
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 2 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
ICITA
2005
IEEE
14 years 1 months ago
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the...
Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien...
IM
2007
13 years 7 months ago
A Service Middleware that Scales in System Size and Applications
We present a peer-to-peer service management middleware that dynamically allocates system resources to a large set of applications. The system achieves scalability in number of no...
Constantin Adam, Rolf Stadler, Chunqiang Tang, Mal...
HT
2009
ACM
14 years 2 months ago
Sixearch.org 2.0 peer application for collaborative web search
Sixearch.org is a peer application for social, distributed, adaptive Web search, which integrates the Sixearch.org protocol, a topical crawler, a document indexing system, a retri...
Namrata Lele, Le-Shin Wu, Ruj Akavipat, Filippo Me...
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 2 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar