Sciweavers

2504 search results - page 340 / 501
» Distributed Mobility Control for Fault-Tolerant Mobile Netwo...
Sort
View
IEEEIA
2009
13 years 7 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
ICC
2000
IEEE
376views Communications» more  ICC 2000»
14 years 1 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi
ICOIN
2004
Springer
14 years 2 months ago
An Enhanced Handoff Mechanism for Cellular IP
Handoff is one of the most important factors that may degrade the performance of TCP connections in wireless data networks. In this paper, we present a lossless and duplication fr...
Kyung-ah Kim, Jong-Deok Kim, Chong-kwon Kim, Jae-y...
WICON
2008
13 years 10 months ago
HxH: a hop-by-hop transport protocol for multi-hop wireless networks
TCP can perform poorly in multi-hop wireless networks due to problems that arise with contention and mobility. Endto-end protocols are at an inherent disadvantage in trying to sol...
Daniel Scofield, Lei Wang, Daniel Zappala
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 9 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed