Sciweavers

1017 search results - page 193 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
SIMUTOOLS
2008
13 years 10 months ago
ns-2 vs. OPNET: a comparative study of the IEEE 802.11e technology on MANET environments
In this work we present the results of a comparative study between two well-known network simulators: ns-2 and OPNET Modeler. In particular, we focus on a performance evaluation o...
P. Pablo Garrido, Manuel P. Malumbres, Carlos Migu...
WIMOB
2008
IEEE
14 years 2 months ago
Towards an Understanding of Security Concerns within Communities
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
SIGMETRICS
2009
ACM
182views Hardware» more  SIGMETRICS 2009»
14 years 2 months ago
The age of gossip: spatial mean field regime
Disseminating a piece of information, or updates for a piece of information, has been shown to benefit greatly from simple randomized procedures, sometimes referred to as gossipi...
Augustin Chaintreau, Jean-Yves Le Boudec, Nikodin ...
MOBISYS
2009
ACM
14 years 9 months ago
Point&Connect: intention-based device pairing for mobile phone users
Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-and-connect: wh...
Chunyi Peng, Guobin Shen, Yongguang Zhang, Songwu ...
MSWIM
2005
ACM
14 years 2 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...