Sciweavers

WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
WOWMOM
2005
ACM
195views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Exploiting MAC Flexibility in WiMAX for Media Streaming
The IEEE 802.16 standard (commonly known as WiMAX) which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. However, providing p...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly...
WOWMOM
2005
ACM
118views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Fast IP Handoff Support for VoIP and Multimedia Applications in 802.11 WLANs
Wireless LANs (WLANs) have edged into numerous mobile and wireless users’ daily experience worldwide as a mainstream connectivity solution for a broad range of applications. Eve...
Ioanna Samprakou, Christos Bouras, Theodore Karoub...
WOWMOM
2005
ACM
75views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Towards an Asynchronous Dissemination and a Safe Deployment of Lightweight Programs in Mobile Networks
This paper presents the design and the implementation of a platform allowing owners of mobile devices to exchange software application programs using a peer-to-peer scheme in hybr...
Hervé Roussain, Nicolas Le Sommer, Fr&eacut...
WOWMOM
2005
ACM
130views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Context-Aware Service Discovery in Heterogeneous Networks
Pervasive environments bring new challenges for service management, as clients have to handle large collections of services offered by concurrent networks at their location, as we...
Pierre-Guillaume Raverdy, Valérie Issarny
WOWMOM
2005
ACM
82views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Power Control is not Required for Wireless Networks in the Linear Regime
— We consider the design of optimal strategies for joint power adaptation, rate adaptation and scheduling in a multi-hop wireless network. Most existing strategies control either...
Bozidar Radunovic, Jean-Yves Le Boudec
WOWMOM
2005
ACM
138views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc Networks
Current ad hoc multicast routing protocols have been designed to build and maintain a tree or mesh in the face of a mobile environment, with fast reaction to network changes in or...
Manoj Pandey, Daniel Zappala
WOWMOM
2005
ACM
90views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANs
IEEE 802.11 wireless local area networks that span large buildings or campuses must comprise multiple cells, several of which must necessarily be cochannel cells. It can be shown ...
Manoj K. Panda, Anurag Kumar, S. H. Srinivasan
WOWMOM
2005
ACM
148views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks
Both Mobile Ad Hoc Networks (MANETs) and Peer-toPeer (P2P) Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a d...
Leonardo B. Oliveira, Isabela G. Siqueira, Daniel ...
WOWMOM
2005
ACM
98views Multimedia» more  WOWMOM 2005»
14 years 5 months ago
Intuitive Human Governance of Autonomic Pervasive Computing Environments
This paper proposes an intuitive configuration tool for autonomic pervasive computing systems. Specifically the paper presents a system for the inference of user task intentions f...
Tony O'Donnell, David Lewis, Vincent Wade