Sciweavers

MOBIHOC
2000
ACM
14 years 1 months ago
DEAPspace: transient ad-hoc networking of pervasive devices
The rapid spreading of mobile computerized devices marks the beginning of a new computing paradigm characterized by ad hoc networking and spontaneous interaction, taking place tra...
Reto Hermann, Dirk Husemann, Michael Moser, Michae...
MOBIHOC
2000
ACM
14 years 1 months ago
Dynamic quality-of-service for mobile ad hoc networks
In this paper we discuss the dynamic network characteristics of mobile ad hoc networks, and explore problems that arise when attempting to provide QoS support in this environment....
M. Mirhakkak, N. Schult, D. Thomson
MOBIHOC
2000
ACM
14 years 1 months ago
Utility-based decision-making in wireless sensor networks
— We consider challenges associated with application domains in which a large number of distributed, networked sensors must perform a sensing task repeatedly over time. We addres...
John W. Byers, Gabriel Nasser
MOBIHOC
2000
ACM
14 years 1 months ago
Neighbor supporting ad hoc multicast routing protocol
—An ad hoc network is a multi-hop wireless network formed by a collection of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and a high degree o...
Seungjoon Lee, Chongkwon Kim
MOBIHOC
2000
ACM
14 years 1 months ago
Enforcing service availability in mobile ad-hoc WANs
Levente Buttyán, Jean-Pierre Hubaux
MOBIHOC
2000
ACM
14 years 1 months ago
Role-based multicast in highly mobile but sparsely connected ad hoc networks
— We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special need...
Linda Briesemeister, Günter Hommel
MOBIHOC
2000
ACM
14 years 1 months ago
LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility
– In this paper, we present a novel routing protocol for wireless ad hoc networks – Landmark Ad Hoc Routing (LANMAR). LANMAR combines the features of Fisheye State Routing (FSR...
Guangyu Pei, Mario Gerla, Xiaoyan Hong
NDSS
2000
IEEE
14 years 1 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
NDSS
2000
IEEE
14 years 1 months ago
Accountability and Control of Process Creation in Metasystems
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
NDSS
2000
IEEE
14 years 1 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song