Sciweavers

1440 search results - page 268 / 288
» Mobility Model for Tactical Networks
Sort
View
SASN
2005
ACM
14 years 2 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
CORR
2007
Springer
132views Education» more  CORR 2007»
13 years 8 months ago
On Compact Routing for the Internet
The Internet’s routing system is facing stresses due to its poor fundamental scaling properties. Compact routing is a research field that studies fundamental limits of routing ...
Dmitri V. Krioukov, Kimberly C. Claffy, Kevin R. F...
EDOC
2004
IEEE
14 years 14 days ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
MOBICOM
1997
ACM
14 years 8 days ago
Web Browsing in a Wireless Environment: Disconnected and Asynchronous Operation in ARTour Web Express
In a previous paper [elided], we described ARTour Web Express, a software system that makes it possible to run World Wide Web applications over wide-area wireless networks. Our ea...
Henry Chang, Carl D. Tait, Norman H. Cohen, Moshe ...
CCCG
2008
13 years 10 months ago
Memory Requirements for Local Geometric Routing and Traversal in Digraphs
Local route discovery in geometric, strongly connected, undirected plane graphs is guaranteed by the Face Routing algorithm. The algorithm is local and geometric in the sense that...
Maia Fraser, Evangelos Kranakis, Jorge Urrutia