Sciweavers

43190 search results - page 8567 / 8638
» Can Development Be Designed
Sort
View
150
Voted
CCR
2010
184views more  CCR 2010»
15 years 3 months ago
Characterising temporal distance and reachability in mobile and online social networks
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
CCR
2008
109views more  CCR 2008»
15 years 3 months ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...
149
Voted
CN
2008
127views more  CN 2008»
15 years 3 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
COMCOM
2008
145views more  COMCOM 2008»
15 years 3 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COMCOM
2008
153views more  COMCOM 2008»
15 years 3 months ago
Available bandwidth estimation and admission control for QoS routing in wireless mesh networks
This article presents an integrated admission control and routing mechanism for multi-rate wireless mesh networks. Admission control depends on precise estimates of available band...
Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar...
« Prev « First page 8567 / 8638 Last » Next »