Sciweavers

ADHOCNETS
2009
Springer
14 years 6 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte
ADHOCNETS
2009
Springer
14 years 6 months ago
Distributed Spectrum Sharing for Video Streaming in Cognitive Radio Ad Hoc Networks
A distributed joint routing and spectrum sharing algorithm for video streaming applications over cognitive radio ad hoc networks is proposed in this article. The proposed cross-lay...
Lei Ding, Scott Pudlewski, Tommaso Melodia, Stella...
ICNS
2009
IEEE
14 years 6 months ago
Advanced Hash Algorithms with Key Bits Duplication for IP Address Lookup
Hashing technique have been widely adopted for various computer network applications such as IP address lookup and intrusion detection, among which XOR-hashing is one of most popu...
Christopher J. Martinez, Wei-Ming Lin
ICNS
2009
IEEE
14 years 6 months ago
A Macro View of Viral Propagation and Its Persistence in Heterogeneous Wireless Networks
Now that smart phones can interact with computers through various interface technologies such as Bluetooth, infrared, or the 802.11 family of IEEE specifications, they are workin...
Hoai-Nam Nguyen, Yoichi Shinoda
ICNS
2009
IEEE
14 years 6 months ago
SIP-Based IMS Registration Analysis for WiMax-3G Interworking Architectures
The 3rd generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network independent IP-based services ...
Arslan Munir, Ann Gordon-Ross
ICNS
2009
IEEE
14 years 6 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet
ICNS
2009
IEEE
14 years 6 months ago
Psychometric and Evidentiary Approaches to Simulation Assessment in Packet Tracer Software
Packet Tracer is a comprehensive instructional software application for teaching skills and concepts associated with computer networking. In addition to a wide range of simulation...
Dennis C. Frezzo, John T. Behrens, Robert J. Misle...
ICNS
2009
IEEE
14 years 6 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
ICNS
2009
IEEE
14 years 6 months ago
Security Solution for Mobile Ad Hoc Network of Networks (MANoN)
Ali H. Al-Bayatti, Hussein Zedan, Antonio Cau
ICNS
2009
IEEE
14 years 6 months ago
Impact of Obstacles on the Degree of Mobile Ad Hoc Connection Graphs
What is the impact of obstacles on the graphs of connections between stations in Mobile Ad hoc Networks? In order to answer, at least partially, this question, the first step is ...
Cédric Gaël Aboue-Nze, Fréd&eac...