Sciweavers

179 search results - page 16 / 36
» Performance Analysis of Stealth DHT with Mobile Nodes
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Modeling Time-Variant User Mobility in Wireless Mobile Networks
Abstract— Realistic mobility models are important to understand the performance of routing protocols in wireless ad hoc networks, especially when mobility-assisted routing scheme...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...
ITCC
2005
IEEE
14 years 1 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
BROADNETS
2005
IEEE
14 years 1 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
GLOBECOM
2008
IEEE
14 years 2 months ago
Investigating the Performance Impact of Shared Host Capacity in Ad Hoc Networks
— Host resources (e.g., CPU time and buffer space) in mobile ad hoc networks must be shared between the devices own applications and networking functions, such as routing and pac...
Yan He, Ikhlas Ajbar, Van Nguyen, Dmitri Perkins
ISCC
2007
IEEE
14 years 1 months ago
Analysis of Load Dependency of Handover Strategies in Mobile Multiaccess Ambient Networks
Wireless operators incorporate multiradio access technologies aiming at expanding their customer base and benefiting from synergies of existing and planned infrastructure. The res...
Petteri Pöyhönen, Daniel Hollos, Haitao ...