Sciweavers

AINA
2011
IEEE
13 years 3 months ago
Exploring Multi-homing Issues in Heterogeneous Environments
—Mobile devices with two network interfaces (WiFi and 3G) are already commercially available. Pointto-point communications such as Infrared and Bluetooth are also readily used. I...
Glenford E. Mapp, Mahdi Aiash, Hélio Cresta...
AINA
2011
IEEE
13 years 3 months ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang
AINA
2011
IEEE
13 years 3 months ago
Power Adaptive Cognitive Pilot Channel for Spectrum Co-existence in Wireless Networks
— Next generation wireless networks will be heterogeneous, where several primary users (PU e.g. licensed users) and secondary users (SU e.g. unlicensed users) can operate in the ...
Md. Akbar Hossain, Roberto Passerone
AIMS
2011
Springer
13 years 3 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
ADHOCNOW
2011
Springer
13 years 3 months ago
Joint Duty Cycle Scheduling, Resource Allocation and Multi-constrained QoS Routing Algorithm
Wireless mesh sensor networks (WMSNs) have recently gained a lot of interest due to their communication capability to support various applications with different Quality of Service...
Jamila Ben Slimane, Yeqiong Song, Anis Koubaa, Mou...
CNSM
2010
13 years 3 months ago
Towards non-expert users monitoring networks and services through semantically enhanced visualizations
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...
AINA
2010
IEEE
13 years 3 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
AINA
2010
IEEE
13 years 3 months ago
Using Ontology for Personalized Mobile Message Computation
Li-Hua Li, Fu-Ming Lee, Yu-Chien Chou, Tsung-Jen P...
AINA
2010
IEEE
13 years 3 months ago
Human-Computer Interaction Experiments
Tomasz P. Bednarz, Con Caris, Jeremy Thompson, Chr...
WIOPT
2011
IEEE
13 years 3 months ago
Lower bounds on the success probability for ad hoc networks with local FDMA scheduling
—This paper studies the performance of ad hoc networks with local FDMA scheduling using stochastic point processes. In such networks, the Poisson assumption is not justified due...
Ralph Tanbourgi, Jens P. Elsner, Holger Jäkel...