Sciweavers

785 search results - page 127 / 157
» Cache Behavior of Network Protocols
Sort
View
ADHOCNOW
2008
Springer
14 years 1 months ago
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simpl...
Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
SIGCOMM
2006
ACM
14 years 1 months ago
Jigsaw: solving the puzzle of enterprise 802.11 analysis
The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise...
Yu-Chung Cheng, John Bellardo, Péter Benk&o...
ICNS
2007
IEEE
14 years 1 months ago
A Case Study-based Performance Evaluation Framework for CSCF Processes on a Blade-Server
Abstract— The study of protocol behavior and traffic characteristics in a simulated environment is commonly supported by ad-hoc or general purpose simulators (e.g., Opnet, NS-2)...
Preetam Ghosh, Nirmalya Roy, Kalyan Basu, Sajal K....
ASUNAM
2009
IEEE
14 years 2 months ago
Dynamics of Inter-Meeting Time in Human Contact Networks
—We envision new communication paradigms, using physical dynamic interconnectedness among people. Delay Tolerant Networks (DTNs) are a new communication paradigm to support such ...
Eiko Yoneki, Dan Greenfield, Jon Crowcroft