Sciweavers

37 search results - page 4 / 8
» jnw 2006
Sort
View
JNW
2006
55views more  JNW 2006»
13 years 5 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
JNW
2006
111views more  JNW 2006»
13 years 5 months ago
Performance Evaluation of Interconnection Mechanisms for Ad Hoc Networks across Mobility Models
There is being an on-going effort in the research community to efficiently interconnect Mobile Ad hoc Networks (MANET) to fixed ones like the Internet. Several approaches have been...
Francisco J. Ros, Pedro M. Ruiz, Antonio F. G&oacu...
JNW
2006
174views more  JNW 2006»
13 years 5 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
JNW
2008
79views more  JNW 2008»
13 years 5 months ago
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks
This paper proposes a method for scheduling and buffer management in differentiated services networks which is based on JoBS algorithm. JoBS differentiates traffic classes base on ...
Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi
JNW
2008
116views more  JNW 2008»
13 years 4 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...