Sciweavers

1307 search results - page 55 / 262
» Layered Architecture Revised
Sort
View
EJWCN
2010
162views more  EJWCN 2010»
13 years 2 months ago
OMNeT++-Based Cross-Layer Simulator for Content Transmission over Wireless Ad Hoc Networks
Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wire...
Raphaël Massin, Catherine Lamy-Bergot, Christ...
JGAA
2007
87views more  JGAA 2007»
13 years 7 months ago
A 2.5D Hierarchical Drawing of Directed Graphs
We introduce a new graph drawing convention for 2.5D hierarchical drawings of directed graphs. The vertex set is partitioned both into layers of vertices drawn in parallel planes ...
Seok-Hee Hong, Nikola S. Nikolov, Alexandre Tarass...
MOBISYS
2008
ACM
14 years 7 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
WEBI
2009
Springer
14 years 2 months ago
Building Blocks: Layered Components Approach for Accumulating High-Demand Web Services
Abstract—Customization of systems is costly, but it is necessary to better meet the needs of multi-various tasks and requirements in the fields such as medical care, education, ...
Satoshi Morimoto, Satoshi Sakai, Masaki Gotou, Hee...
SERSCISA
2009
Springer
14 years 2 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim