Sciweavers

JNW
2008
128views more  JNW 2008»
13 years 11 months ago
A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services
Web services paradigm is allowing applications to electronically interact with one another over the Internet. The business process execution language (BPEL) takes this ion to a hig...
Onyeka Ezenwoye, Seyed Masoud Sadjadi
JNW
2008
122views more  JNW 2008»
13 years 11 months ago
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems
The capabilities of a sensor network are strongly influenced by the operating system used on the sensor nodes. In general, two different sensor network operating system types are c...
Cormac Duffy, Utz Roedig, John Herbert, Cormac J. ...
JNW
2008
97views more  JNW 2008»
13 years 11 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
JNW
2008
144views more  JNW 2008»
13 years 11 months ago
Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs
Research on data routing strategies for wireless sensor networks (WSNs) has largely focused on energy efficiency. However rapid advances in WSNs require routing protocols which can...
Donggeon Noh, Ikjune Yoon, Heonshik Shin
JNW
2008
133views more  JNW 2008»
13 years 11 months ago
A Route Establishment Scheme for Multi-route Coding in Multihop Cellular Networks
Since the network topology in multihop cellular networks is flexible, multiple routes from a user station to a base station can be established. To reduce packet reception errors of...
Hiraku Okada, Hitoshi Imai, Takaya Yamazato, Masaa...
JNW
2008
99views more  JNW 2008»
13 years 11 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
JNW
2008
123views more  JNW 2008»
13 years 11 months ago
An Application-Specific Reliable Data Transfer Protocol in Wireless Sensor Networks
- We present a new protocol for reliable data transfer in time-critical applications with zero tolerance for data loss in wireless sensor networks which uses less time and fewer me...
Damayanti Datta, Sukhamay Kundu
JNW
2008
129views more  JNW 2008»
13 years 11 months ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang
JNW
2008
177views more  JNW 2008»
13 years 11 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
JNW
2008
106views more  JNW 2008»
13 years 11 months ago
Optimization of Job Schedule Model Based on Grid Environment
CPU utilization, throughput, turnaround time, waiting time, and response time are the factor to influence system performance. Every system uses different scheduling algorithms to a...
Homer Wu, Chong-Yen Lee, Wuu-Yee Chen, Tsang-Yean ...