The inherent and increasing complexity, heterogeneity and unpredictability of computer networks make the task of managing these systems highly complex. The autonomic computing para...
Romildo Martins da Silva Bezerra, Joberto Sé...
This paper proposes an effective file searching scheme named Group P2P to reduce the number of message transmission. In the Group P2P, peers distinguish Parent Peer from Child Peer...
Femtocell is an emerging technology for expanding cell coverage and increasing data rate, and its users deploy in their own premises by themselves. Therefore, femto base stations c...
Sam Yeoul Choi, Tae-Jin Lee, Min Young Chung, Hyun...
In this paper, we focus on the scheme for the route optimization in 6LoWPAN based MANEMO environments. If 6LoWPAN mobile routers for supporting NEMO protocol are organized by neste...
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Applications in wireless sensor networks (WSNs) experience the routing hole problem. That is, the current node cannot forward to the destination, although it is the closest node, b...
Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung...