Sciweavers

1267 search results - page 253 / 254
» On the scalability of IEEE 802.11 ad hoc networks
Sort
View
ACSAC
1998
IEEE
13 years 10 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
IPPS
2005
IEEE
13 years 12 months ago
Energy-Aware Task Scheduling: Towards Enabling Mobile Computing over MANETs
Enabling high performance, persistent mobile computing has recently become a very active research area. The widespread popularity of mobile computing devices, such as laptops, han...
Waleed Alsalih, Selim G. Akl, Hossam S. Hassanein
KBSE
2005
IEEE
13 years 12 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
13 years 11 months ago
Context-Awareness on Mobile Devices - the Hydrogen Approach
Information about the user's environment offers new opportunities and exposes new challenges in terms of time-aware, location-aware, device-aware and personalized application...
Thomas Hofer, Wieland Schwinger, Mario Pichler, Ge...
INFOCOM
2010
IEEE
13 years 4 months ago
A Reaction-Diffusion Model for Epidemic Routing in Sparsely Connected MANETs
—We propose and investigate a deterministic traveling wave model for the progress of epidemic routing in disconnected mobile ad hoc networks. In epidemic routing, broadcast or un...
Daniel J. Klein, João Pedro Hespanha, Upama...