Sciweavers

430 search results - page 67 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
ICAIL
2009
ACM
14 years 2 months ago
Reasoning with spatial plans on the semantic web
ct Land use regulations are an important but often underrated legal domain. Especially in densely populated regions such as the Netherlands, spatial plans have a profound impact on...
Rinke Hoekstra, Radboud Winkels, Erik Hupkes
TMC
2008
108views more  TMC 2008»
13 years 7 months ago
Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks
Abstract--Two well-known problems that can cause performance degradations in IEEE 802.11 wireless networks are the exposednode (EN) and hidden-node (HN) problems. Although there ha...
Li Bin Jiang, Soung Chang Liew
ICNP
2007
IEEE
14 years 2 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
IEEEARES
2007
IEEE
14 years 2 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
NETWORK
2006
218views more  NETWORK 2006»
13 years 8 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...