Sciweavers

1653 search results - page 300 / 331
» Timed analysis of security protocols
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
ETFA
2008
IEEE
14 years 2 months ago
Real-time enabled debugging for distributed systems
The distribution of real-time tasks in a networked environment in principle has several advantages, above all a high degree of flexibility easing system extension and replacement...
Georg Gaderer, Patrick Loschmidt, Thilo Sauter
GLOBECOM
2008
IEEE
14 years 2 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
GLOBECOM
2008
IEEE
14 years 2 months ago
Investigating the Performance Impact of Shared Host Capacity in Ad Hoc Networks
— Host resources (e.g., CPU time and buffer space) in mobile ad hoc networks must be shared between the devices own applications and networking functions, such as routing and pac...
Yan He, Ikhlas Ajbar, Van Nguyen, Dmitri Perkins
WISE
2008
Springer
14 years 1 months ago
Approximate Information Filtering in Peer-to-Peer Networks
Abstract. Most approaches to information filtering taken so far have the underlying hypothesis of potentially delivering notifications from every information producer to subscrib...
Christian Zimmer, Christos Tryfonopoulos, Klaus Be...