Sciweavers

CN
2007
106views more  CN 2007»
13 years 8 months ago
MIPv6 experimental evaluation using overlay networks
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated Wireless Networks and Overlay Networks, which are present in the notion of the forthcoming...
Pablo Vidales, Carlos Jesus Bernardos, Ignacio Sot...
CN
2007
97views more  CN 2007»
13 years 8 months ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
CN
2007
74views more  CN 2007»
13 years 8 months ago
Enhancing TCP for networks with guaranteed bandwidth services
Yujie Zhu, Aravind Velayutham, Oyebamiji Oladeji, ...
CN
2007
81views more  CN 2007»
13 years 8 months ago
On the design of mobility management scheme for 802.16-based network environment
Chun-Chuan Yang, Chun-Shian Tsai, Junn-Yen Hu, Tzu...
CN
2007
90views more  CN 2007»
13 years 8 months ago
Distributed on-demand routing for LEO satellite systems
Notwithstanding the limited commercial success of the first narrowband Low Earth Orbit (LEO) satellite systems, the interest of the scientific community in this type of systems ...
Evangelos Papapetrou, Stylianos Karapantazis, Foti...
CN
2007
91views more  CN 2007»
13 years 8 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
CN
2007
105views more  CN 2007»
13 years 8 months ago
Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link
We consider the flow-level quality of service (QoS) seen by a dynamic load of rate adaptive sessions sharing a bottleneck link based on fair share bandwidth allocation. This is o...
Steven Weber, Gustavo de Veciana
CN
2007
99views more  CN 2007»
13 years 8 months ago
Mistreatment-resilient distributed caching
The distributed partitioning of autonomous, self-aware nodes into cooperative groups, within which scarce resources could be effectively shared for the benefit of the group, is ...
Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bes...
CN
2007
172views more  CN 2007»
13 years 8 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CN
2007
96views more  CN 2007»
13 years 8 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang