Sciweavers

297 search results - page 37 / 60
» Proposal and evaluation of an application level caching sche...
Sort
View
ICN
2005
Springer
14 years 1 months ago
Enhancing QoS Through Alternate Path: An End-to-End Framework
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These ...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
GCC
2004
Springer
14 years 28 days ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
MIDDLEWARE
2007
Springer
14 years 1 months ago
Vector-Field Consistency for Ad-Hoc Gaming
Abstract. Developing distributed multiplayer games for ad-hoc networks is challenging. Consistency of the replicated shared state is hard to ensure at a low cost. Current consisten...
Nuno Santos, Luís Veiga, Paulo Ferreira
ADHOC
2011
13 years 2 months ago
Evaluation and design of beaconing in mobile wireless networks
One of the intrinsic problems of mobility in wireless networks is the discovery of mobile nodes. A widely used solution for this problem is to use different variations of beacons, ...
Abbas Nayebi, Gunnar Karlsson, Hamid Sarbazi-Azad
GLOBECOM
2007
IEEE
14 years 1 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...