Sciweavers

COMCOM
2010
95views more  COMCOM 2010»
13 years 2 months ago
Trading link utilization for queueing delays: An adaptive approach
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in und...
Rade Stanojevic, Robert Shorten
COMCOM
2010
246views more  COMCOM 2010»
13 years 2 months ago
Tabu search algorithm for RP selection in PIM-SM multicast routing
: - To construct a multicast tree is the basis of multicast data transmission. The prime problem concerning the construction of a shared multicast tree is to determine the position...
Hua Wang, Xiangxu Meng, Min Zhang, Yanlong Li
COMCOM
2008
104views more  COMCOM 2008»
13 years 3 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
COMCOM
2008
135views more  COMCOM 2008»
13 years 3 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
COMCOM
2008
95views more  COMCOM 2008»
13 years 3 months ago
PFC: A packet forwarding control scheme for vehicle handover over the ITS networks
When a vehicle moves on roads, it can receive messages from base stations (BSs) and other vehicles. After it moves far away the transmission range, the vehicle tries to find an av...
Chung-Ming Huang, Meng-Shu Chiang, Tz-Heng Hsu
COMCOM
2008
95views more  COMCOM 2008»
13 years 3 months ago
Collaborative data gathering in wireless sensor networks using measurement co-occurrence
Data gathering is a basic activity of many wireless sensor network applications. We propose a novel collaborative data gathering approach utilizing data co
Konstantinos Kalpakis, Shilang Tang
COMCOM
2007
149views more  COMCOM 2007»
13 years 3 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
COMCOM
2008
63views more  COMCOM 2008»
13 years 3 months ago
Range queries over skip tree graphs
Alejandra González Beltrán, Peter Mi...