Sciweavers

EURONGI
2008
Springer
14 years 1 months ago
A Seamless Vertical Handover Approach
Abstract-- Wireless network devices are equipped with multiple access technologies like UMTS and Wireless LAN. The handover between the technologies has been widely studied in lite...
Rastin Pries, Dirk Staehle, Phuoc Tran-Gia, Thorst...
EURONGI
2008
Springer
14 years 1 months ago
Interference-Aware Channel Assignment in Wireless Mesh Networks
DED ABSTRACT The increased popularity and the growth in the number of deployed IEEE 802.11 Access Points (APs) have raised the opportunity to merge together various disjointed wire...
Rosario Giuseppe Garroppo, Stefano Giordano, David...
EURONGI
2008
Springer
14 years 1 months ago
Connectivity Gateway Discovery in MANETs
Abstract. The integration of mobile ad hoc networks into IP-based access networks demands the presence of a gateway which is responsible for propagating some configuration paramete...
Antonio J. Yuste, Alicia Triviño-Cabrera, F...
EURONGI
2008
Springer
14 years 1 months ago
Secure and Efficient Data Collection in Sensor Networks
Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed...
Cristina Cano, Manel Guerrero, Boris Bellalta
EURONGI
2008
Springer
14 years 1 months ago
Notes on Implementing a IEEE 802.11s Mesh Point
Rosario Giuseppe Garroppo, Stefano Giordano, David...
DSOM
2008
Springer
14 years 1 months ago
Web-Based Management of Content Delivery Networks
Abstract overlay networks have been considered enablers of efficient management for decentralized, large scale service deployments. A Content Delivery Network (CDN) is an example o...
George C. Oikonomou, Theodore K. Apostolopoulos
DSOM
2008
Springer
14 years 1 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
DSOM
2008
Springer
14 years 1 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...