Sciweavers

APNOMS
2009
Springer
13 years 9 months ago
Network Partitioning and Self-sizing Methods for QoS Management with Autonomic Characteristics
The inherent and increasing complexity, heterogeneity and unpredictability of computer networks make the task of managing these systems highly complex. The autonomic computing para...
Romildo Martins da Silva Bezerra, Joberto Sé...
APNOMS
2009
Springer
14 years 6 months ago
Group P2P Network Organization in Mobile Ad-Hoc Network
This paper proposes an effective file searching scheme named Group P2P to reduce the number of message transmission. In the Group P2P, peers distinguish Parent Peer from Child Peer...
Rim Haw, Choong Seon Hong, Dae Sun Kim
APNOMS
2009
Springer
14 years 6 months ago
Dimensioning of IPTV VoD Service in Heterogeneous Broadband Access Networks
The IPTV subscription rate has increased steadily since the
Suman Pandey, Young J. Won, Hong-Taek Ju, James W....
APNOMS
2009
Springer
14 years 6 months ago
Adaptive Coverage Adjustment for Femtocell Management in a Residential Scenario
Femtocell is an emerging technology for expanding cell coverage and increasing data rate, and its users deploy in their own premises by themselves. Therefore, femto base stations c...
Sam Yeoul Choi, Tae-Jin Lee, Min Young Chung, Hyun...
APNOMS
2009
Springer
14 years 6 months ago
A Scheme for Supporting Optimal Path in 6LoWPAN Based MANEMO Networks
In this paper, we focus on the scheme for the route optimization in 6LoWPAN based MANEMO environments. If 6LoWPAN mobile routers for supporting NEMO protocol are organized by neste...
Jin Ho Kim, Choong Seon Hong
APNOMS
2009
Springer
14 years 6 months ago
Attack Model and Detection Scheme for Botnet on 6LoWPAN
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...
Eung Jun Cho, Jin Ho Kim, Choong Seon Hong
APNOMS
2009
Springer
14 years 6 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
APNOMS
2009
Springer
14 years 6 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
APNOMS
2009
Springer
14 years 6 months ago
Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding
Applications in wireless sensor networks (WSNs) experience the routing hole problem. That is, the current node cannot forward to the destination, although it is the closest node, b...
Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung...