Sciweavers

1573 search results - page 217 / 315
» Reliable Communication in Overlay Networks
Sort
View
GLOBECOM
2009
IEEE
15 years 8 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
CORR
2010
Springer
87views Education» more  CORR 2010»
15 years 4 months ago
Publishing and Discovery of Mobile Web Services in Peer to Peer Networks
: It is now feasible to host Web Services on a mobile device due to the advances in cellular devices and mobile communication technologies. However, the reliability, usability and ...
Satish Narayana Srirama
CORR
2008
Springer
91views Education» more  CORR 2008»
15 years 4 months ago
A Distributed MAC Protocol for Cooperation in Random Access Networks
WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the ...
Georg Böcherer, Alexandre de Baynast
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
15 years 4 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
MDM
2009
Springer
133views Communications» more  MDM 2009»
15 years 11 months ago
YushanNet: A Delay-Tolerant Wireless Sensor Network for Hiker Tracking in Yushan National Park
The objective of YushanNet is to provide a reliable and robust system for hiker tracking in Yushan National Park, Taiwan. The aggregated information can help national parks to pro...
Yu-Te Huang, Yi-Chao Chen, Jyh-How Huang, Ling-Jyh...