Sciweavers

JNW
2008
116views more  JNW 2008»
13 years 10 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
JNW
2008
146views more  JNW 2008»
13 years 10 months ago
User Behavior and IM Topology Analysis
The use of Instant Messaging, or IM, has become widely adopted in private and corporate communication. They can provide instant, multi-directed and multi-types of communications wh...
Qiang Yan, Xiaoyan Huang
JNW
2008
118views more  JNW 2008»
13 years 10 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
JNW
2008
79views more  JNW 2008»
13 years 11 months ago
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks
This paper proposes a method for scheduling and buffer management in differentiated services networks which is based on JoBS algorithm. JoBS differentiates traffic classes base on ...
Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi
JNW
2006
86views more  JNW 2006»
13 years 11 months ago
Throughput and Delay Analysis of Unslotted IEEE 802.15.4
The IEEE 802.15.4 standard is designed as a low power and low data rate protocol offering high reliability. It defines a beaconed and unbeaconed version. In this work, we analyze t...
Benoît Latré, Pieter De Mil, Ingrid M...
JNW
2006
118views more  JNW 2006»
13 years 11 months ago
UMTS Capacity and Throughput Maximization for Different Spreading Factors
An analytical model for calculating capacity in multi-cell UMTS networks is presented. Capacity is maximized for different spreading factors and for perfect and imperfect power con...
Robert Akl, Son Nguyen
JNW
2006
120views more  JNW 2006»
13 years 11 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
JNW
2006
63views more  JNW 2006»
13 years 11 months ago
Operational Experiment of Seamless Handover of a Mobile Router using Multiple Care-of Address Registration
NEMO Basic Support (NEMO BS) adds a mobility function to IPv6 routers, such a router is called as a mobile router. The network behind the mobile router (mobile network) becomes log...
Keiichi Shima, Yojiro Uo, Nobuo Ogashiwa, Satoshi ...
JNW
2006
111views more  JNW 2006»
13 years 11 months ago
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...
Thavisak Manodham, Tetsuya Miki
JNW
2006
111views more  JNW 2006»
13 years 11 months ago
Performance Evaluation of Interconnection Mechanisms for Ad Hoc Networks across Mobility Models
There is being an on-going effort in the research community to efficiently interconnect Mobile Ad hoc Networks (MANET) to fixed ones like the Internet. Several approaches have been...
Francisco J. Ros, Pedro M. Ruiz, Antonio F. G&oacu...