Sciweavers

BROADNETS
2007
IEEE
14 years 5 months ago
On the stability of virtual network topology control for overlay routing services
Abstract— Overlay networks achieve new functionality and enhance network performance by allowing routing to be controlled at the application layer. However, these approaches resu...
Yuki Koizumi, Takashi Miyamura, Shin'ichi Arakawa,...
BROADNETS
2007
IEEE
14 years 5 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
BROADNETS
2007
IEEE
14 years 5 months ago
Optimal sleep-wakeup algorithms for barriers of wireless sensors
Santosh Kumar, Ten-Hwang Lai, Marc E. Posner, Pras...
BROADNETS
2007
IEEE
14 years 5 months ago
Reconsidering power management
— Power-management approaches have been widely studied in an attempt to conserve idling energy by allowing nodes to switch to a low-power sleep mode. However, due to the inherent...
Cigdem Sengul, Albert F. Harris III, Robin Kravets
BROADNETS
2007
IEEE
14 years 5 months ago
Design and control of optical grid networks
—Grid computing aims to realize a high-performance computing environment, while increasing the usage efficiency of installed resources. This puts considerable constraints on the...
Marc De Leenheer, Chris Develder, Tim Stevens, Bar...
AINA
2007
IEEE
14 years 5 months ago
Self-Organizing Spatial Regions for Sensor Network Infrastructures
This paper focuses on sensor networks as shared environmental infrastructures, and presents an approach to enable a sensor network to self-partition itself, at pre-defined energy ...
Nicola Bicocchi, Marco Mamei, Franco Zambonelli
AINA
2007
IEEE
14 years 5 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
AINA
2007
IEEE
14 years 5 months ago
VOICE: A Framework for Speech-Based Mobile Systems
The advent of mobile phones and the Internet opened the doors for an emerging class of applications that connect mobile users to online resources and information services availabl...
Adam Sharp, Stan Kurkovsky
AINA
2007
IEEE
14 years 5 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
AINA
2007
IEEE
14 years 5 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...