Sciweavers

1283 search results - page 199 / 257
» Atomicity Implementation in Mobile Computing
Sort
View
WIMOB
2008
IEEE
14 years 3 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
IFIP
2007
Springer
14 years 3 months ago
Semantic Context Reasoning Using Ontology Based Models
New mobile computing technologies and the increasing use of portable devices have pushed the development of the so-called context-aware applications. This new class of applications...
Rodrigo Mantovaneli Pessoa, Camilo Zardo Calvi, Jo...
IFIP
2007
Springer
14 years 3 months ago
Multicast in UMTS: Adopting TCP-Friendliness
In this paper, we present a novel mechanism for the multicast congestion control over UMTS networks. The proposed mechanism is based on the well known TCP-Friendly Multicast Conges...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
DEXAW
2005
IEEE
356views Database» more  DEXAW 2005»
14 years 2 months ago
Grid Visualizer: A Monitoring Tool for Grid Environment
One specific problem in wide-area distributed computing environment is effective management of the vast amount of resources that are made available within the grid environment. Th...
Ghazala Shaheen, Muhammad Usman Malik, Zohair Ihsa...
PEWASUN
2005
ACM
14 years 2 months ago
Investigating unfairness scenarios in MANET using 802.11b
An experimental study of MANET using 802.11b has shown that there exist several configurations where this standard does not guarantee fairness for the channel access. In this pap...
Leïla Kloul, Fabrice Valois