Sciweavers

332 search results - page 47 / 67
» Measuring performance impact of security protocols in wirele...
Sort
View
CCR
2006
116views more  CCR 2006»
13 years 7 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
PERCOM
2006
ACM
14 years 7 months ago
Node Clustering in Mobile Peer-to-Peer Multihop Networks
In mobile peer-to-peer (MP2P) networks, nodes tend to gather together rather than scattered uniformly across the network area. This paper considers the clustering of peer nodes an...
Chansu Yu, Kang G. Shin, Ben Lee, Seung-Min Park, ...
ICDCS
2006
IEEE
14 years 1 months ago
PRINS: Optimizing Performance of Reliable Internet Storages
Distributed storage systems employ replicas or erasure code to ensure high reliability and availability of data. Such replicas create great amount of network traffic that negative...
Qing Yang, Weijun Xiao, Jin Ren
EUC
2008
Springer
13 years 9 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
INFOCOM
2005
IEEE
14 years 1 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...