Sciweavers

ICON
2007
IEEE
14 years 5 months ago
A Light-Weight Client Mobility Approach for Infrastructure Mesh Networks
— Infrastructure mesh networks offer a high-capacity wireless backhaul network through which client devices, such as PDAs, can connect to one another or with external networks. T...
Ryan Wishart, Asad Amir Pirzada, Marius Portmann
ICON
2007
IEEE
14 years 5 months ago
Fast Duplicate Address Detection for Mobile IPv6
Several components contribute to handover delay of Mobile IPv6, namely, movement detection time, address configuration time, binding registration time, and route optimization time....
Panita Pongpaibool, Pahol Sotthivirat, Sukumal I. ...
ICON
2007
IEEE
14 years 5 months ago
An Approximate Analysis of the Balance among Performance, Utilization and Power Estimation of Server Systems by Use of the Batch
- In this paper we analyze the performance, utilization, and power estimation of server systems by both adopting the batch service and adjusting the batch size. In addition to redu...
Ying-Wen Bai, Yung-Sen Cheng, Cheng-Hung Tsai
ICON
2007
IEEE
14 years 5 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen
ICON
2007
IEEE
14 years 5 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
ICON
2007
IEEE
14 years 5 months ago
A Novel WDM EPON Architecture with Wavelength Spatial Reuse in High-Speed Access Networks
This study proposes a novel WDM EPON system based upon an AWG, in which multiple wavelengths are established in both the upstream and the downstream fibers. The use of the AWG devi...
Wang-Rong Chang, Hui-Tang Lin, Sheng-Jhe Hong, Cha...
ICON
2007
IEEE
14 years 5 months ago
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of th...
Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Su...
ICON
2007
IEEE
14 years 5 months ago
A New Pre-emption Policy For MPLS-TE Networks
— The pre-emption mechanism may be used in Multi Protocol Label Switching Traffic Engineering (MPLS-TE) networks in order to reduce the number of rejected tunnels during failure...
Imène Chaieb, Jean-Louis Le Roux, Bernard C...
ICON
2007
IEEE
14 years 5 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
ICNSC
2007
IEEE
14 years 5 months ago
Ceiling Light Landmarks Based Localization and Motion Control for a Mobile Robot
—This paper presents ceiling light landmarks based localization and motion control for a mobile robot. The novel mechanism design for the mobile robot is introduced, and the meth...
Hongbo Wang, Hongnian Yu, Lingfu Kong