Sciweavers

1030 search results - page 83 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
WICON
2008
15 years 5 months ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...
IDMS
2001
Springer
195views Multimedia» more  IDMS 2001»
15 years 8 months ago
Design and Application of TOAST: An Adaptive Distributed Multimedia Middleware Platform
The rise of mobile computing and wireless network technology means that, increasingly, applications must adapt to their environment, in particular network connectivity and resource...
Tom Fitzpatrick, Julian R. Gallop, Gordon S. Blair...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 10 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
175
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
NCA
2005
IEEE
15 years 9 months ago
Slingshot: Time-Critical Multicast for Clustered Applications
Datacenters are complex environments consisting of thousands of failure-prone commodity components connected by fast, high-capacity interconnects. The software running on such dat...
Mahesh Balakrishnan, Stefan Pleisch, Ken Birman