Sciweavers

1536 search results - page 95 / 308
» Flexible simulation of distributed protocols for mobile comp...
Sort
View
ADHOCNETS
2009
Springer
15 years 10 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
134
Voted
ADHOC
2005
84views more  ADHOC 2005»
15 years 3 months ago
Infrastructure-based MAC in wireless mobile ad-hoc networks
- The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, in an ad-hoc environment, the Point Coordination Func...
Hossam S. Hassanein, Tiantong You, Hussein T. Mouf...
PERCOM
2006
ACM
16 years 3 months ago
Performance Analysis of Stealth DHT with Mobile Nodes
The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes co...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, La...
ECOOPW
1999
Springer
15 years 7 months ago
Mutual Protection of Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and op...
Volker Roth
126
Voted
WETICE
1998
IEEE
15 years 7 months ago
Questionnaires: A Framework using Mobile Code for Component-Based Tele-Exams
Applications for computer supported cooperative work can gain from component models and frameworks. The framework for "questionnaires", which is described in this paper,...
Jakob Hummes, Arnd Kohrs, Bernard Mérialdo