Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). Different types of service discovery arch...
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
—In this paper, we explore the feasibility of using Mobile Ad-hoc Networks (MANETs) for rural public safety. First, we discuss a QoS enhancement to a standard routing protocol, D...
Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wol...
When the World-Wide Web was first created, the content on most Web sites was simply a collection of static files. Today, many Web sites dynamically generate responses “on the ...
Lance Titchkosky, Martin F. Arlitt, Carey L. Willi...
We study several transparent techniques for scaling dynamic content web sites, and we evaluate their relative impact when used in combination. Full transparency implies strong dat...