Sciweavers

201 search results - page 7 / 41
» Supporting ad hoc Analyses on Enterprise Models
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
13 years 7 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
AVI
2010
13 years 7 months ago
Designing a cross-channel information management tool for workers in enterprise task forces
This paper presents a research project on the design of a cross-channel information management tool for knowledge workers: we focus on IT services professionals in a large enterpr...
Gregorio Convertino, Sanjay Kairam, Lichan Hong, B...
PADS
2004
ACM
14 years 1 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
WWIC
2004
Springer
197views Communications» more  WWIC 2004»
14 years 28 days ago
Context-Aware Group Communication in Mobile Ad-Hoc Networks
Abstract. The widespread availability of both fixed and wireless network connectivity and the growing market of portable devices are enabling anytime and anywhere impromptu collabo...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
COCOON
2005
Springer
14 years 1 months ago
Theoretically Good Distributed CDMA/OVSF Code Assignment for Wireless Ad Hoc Networks
Orthogonal Variable Spreading Factor (OVSF) CDMA code has the ability to support higher and variable data rates with a single code using one transceiver. A number of CDMA code ass...
Xiang-Yang Li, Peng-Jun Wan