Sciweavers

ISCC
2008
IEEE
14 years 6 months ago
A vendor-independent resource control framework for WiMAX
In this paper, a novel solution to dynamically control the resources of a WiMAX system is proposed. The presented solution is aligned with the NGN trends, as well as with the WiMA...
Pedro Neves, Tuomas Nissilä, Telmo Pereira, I...
ISCC
2008
IEEE
14 years 6 months ago
Scheduling high-rate sessions in Fractional Lambda Switching networks: Algorithm and analysis
This work addresses the high-rate session scheduling problem in Fractional Lambda Switching (FλS) networks. With its global phase synchronization and pipeline forwarding (PF) ope...
Thu-Huong Truong, Mario Baldi, Yoram Ofek
ISCC
2008
IEEE
129views Communications» more  ISCC 2008»
14 years 6 months ago
AT-Angle: A distributed method for localization using angles in sensor networks
Determining where a given sensor is physically located is a challenging issue. In this paper, we address the localization problem where, initially, a certain number of sensors cal...
Clément Saad, Abderrahim Benslimane, Jean-C...
ISCC
2008
IEEE
185views Communications» more  ISCC 2008»
14 years 6 months ago
Towards business model and technical platform for the service oriented context-aware mobile virtual communities
: Owing to the recent technical advances in the computing and mobile communications domain, the world of online virtual communities is experiencing a phenomenal growth and ever-inc...
Pravin Pawar, Julien Subercaze, Pierre Maret, Bert...
ISCC
2008
IEEE
122views Communications» more  ISCC 2008»
14 years 6 months ago
A flexible network monitoring tool based on a data stream management system
Network monitoring is a complex task that generally requires the use of different tools for specific purposes. This paper describes a flexible network monitoring tool, called Pa...
Natascha Petry Ligocki, Carmem S. Hara, Christiano...
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
14 years 6 months ago
Analyzing a human-based trust model for mobile ad hoc networks
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ISCC
2008
IEEE
14 years 6 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
ISCC
2008
IEEE
110views Communications» more  ISCC 2008»
14 years 6 months ago
Performance testing of Mobile IPv6 protocol
Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility ofIPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing c...
Huiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin,...
ISCC
2008
IEEE
105views Communications» more  ISCC 2008»
14 years 6 months ago
VoRaQue: Range queries on Voronoi overlays
—This paper presents VoRaQue, a software layer supporting range queries on Voronoi P2P overlays. VoRaQue maps data in a 2-dimensional space. The P2P overlay is defined by links ...
Michele Albano, Laura Ricci, Martina Baldanzi, Ran...
ISCC
2008
IEEE
254views Communications» more  ISCC 2008»
14 years 6 months ago
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
Rafael De T. Valle, Diego G. Passos, Célio ...