Sciweavers

55 search results - page 2 / 11
» jnw 2008
Sort
View
JNW
2008
103views more  JNW 2008»
13 years 4 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
JNW
2008
123views more  JNW 2008»
13 years 4 months ago
An Application-Specific Reliable Data Transfer Protocol in Wireless Sensor Networks
- We present a new protocol for reliable data transfer in time-critical applications with zero tolerance for data loss in wireless sensor networks which uses less time and fewer me...
Damayanti Datta, Sukhamay Kundu
JNW
2008
108views more  JNW 2008»
13 years 4 months ago
Energy Efficient MANET Routing Using a Combination of Span and BECA/AFECA
This paper presents some novel approaches for energy efficient routing in mobile ad-hoc networks. Two known energy preserving techniques, Span and BECA/AFECA, are combined with a w...
Mads Darø Kristensen, Niels Olof Bouvin
JNW
2008
118views more  JNW 2008»
13 years 3 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
JNW
2008
128views more  JNW 2008»
13 years 4 months ago
A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services
Web services paradigm is allowing applications to electronically interact with one another over the Internet. The business process execution language (BPEL) takes this ion to a hig...
Onyeka Ezenwoye, Seyed Masoud Sadjadi