Sciweavers

731 search results - page 76 / 147
» On the use of SHIM6 for mobility support in IMS networks
Sort
View
WS
2003
ACM
14 years 2 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
AINA
2008
IEEE
14 years 3 months ago
Towards a Usenet-Like Discussion System for Users of Disconnected MANETs
Applications that rely on the publish-subscribe model (such as those dedicated to news or event distribution) require a communication model whereby information can flow towards a...
Julien Haillot, Frédéric Guidec
EUROPAR
2003
Springer
14 years 2 months ago
A Coordination Model for ad hoc Mobile Systems
The growing success of wireless ad hoc networks and portable hardware devices presents many interesting problems to software engineers. Particular, coordination is a challenging t...
Marco Tulio de Oliveira Valente, Fernando Magno Qu...
MOBIHOC
2004
ACM
14 years 2 months ago
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and ...
Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura
IWIA
2005
IEEE
14 years 2 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp