Sciweavers

2699 search results - page 469 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ICNP
2009
IEEE
14 years 2 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
ICNS
2009
IEEE
14 years 2 months ago
Balancing Load of APs by Concurrent Association of Every Wireless Node with Many APs
Abstract— In this paper we propose a novel method for associating Wireless Mobile Nodes (WMNs) to Access Points (APs) in busy Wireless access networks. The proposed method associ...
Dilip Sarkar, Uttam K. Sarkar
INFOCOM
2009
IEEE
14 years 2 months ago
Towards Economically Viable Infrastructure-Based Overlay Multicast Networks
—Internet-scale dissemination of streaming contents (e.g., live sports games) can be achieved by infrastructure-based overlay multicast networks, where multicast service provider...
Varun Khare, Bo Zhang
ISORC
2009
IEEE
14 years 2 months ago
Extended RT-Component Framework for RT-Middleware
Modular component-based robot systems require not only an infrastructure for component management, but also scalability as well as real-time properties. Robot Technology (RT)-Midd...
Hiroyuki Chishiro, Yuji Fujita, Akira Takeda, Yuta...
SIGCOMM
2009
ACM
14 years 2 months ago
A standalone content sharing application for spontaneous communities of mobile handhelds
This demo illustrates the benefits of BitHoc, a standalone protocol for content sharing among spontaneous communities of mobile handhelds using wireless multi-hop connections. Bi...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...