Abstract. The main goal of research concerning energy aware routing algorithm for wireless sensor network is to increase the lifetime and long-term connectivity of the wireless sen...
Sangho Yi, Geunyoung Park, Junyoung Heo, Jiman Hon...
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its correspo...
The emergence of Internet, Intranet, local area networks, and ad hoc wireless networks introduces a plethora of new problems in information processing. In order to overcome these p...
In this paper, the rapid mobility of MIP/WLAN is emulated on a test-bed. The performance of MIP/WLAN at different moving speeds is evaluated. The result shows that current MIP prot...
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. T...
In next generation network (NGN), end-to-end QoS is one of the critical issues for real-time multimedia communications and applications. Such applications are sensitive to the avai...
Existing approaches for sensor networks suffer from a number of critical drawbacks. First, homogeneous deployments have been commonly assumed, but in practice multiple deployments ...
Lionel M. Ni, Yanmin Zhu, Jian Ma, Minglu Li, Qion...
3G-324M is a multimedia transmission protocol designed for 3G communication environment. Meanwhile H.245 standard is a control protocol in 3G-324M and gives specific descriptions a...
Transcoding proxy caching is an important technology for improving the services over Internet, especially in the environment of mobile computing systems. In this paper, we address ...