Sciweavers

FGCN
2007
IEEE
125views Communications» more  FGCN 2007»
13 years 4 months ago
Evaluation of a Simple Load Balancing Improvement for Reliable Server Pooling with Heterogeneous Server Pools
The IETF is currently standardizing a light-weight protocol framework for server redundancy and session failover: Reliable Server Pooling (RSerPool). It is the novel combination o...
Xing Zhou, Thomas Dreibholz, Erwin P. Rathgeb
FGCN
2007
IEEE
164views Communications» more  FGCN 2007»
13 years 6 months ago
Future Application Scenarios for MANET-Based Intelligent Transportation Systems
Road transportation systems are traditionally characterized by how efficient they direct traffic in a non-congested manner towards their destinations. Improvement in car electroni...
Chai-Keong Toh
FGCN
2007
IEEE
148views Communications» more  FGCN 2007»
13 years 6 months ago
Capacity Increase for Voice over IP Traffic through Packet Aggregation in Wireless Multihop Mesh Networks
Recently, Voice over IP (VoIP) has become an important service for the future internet. However, for ubiquitous wireless VoIP services, greater coverage will be necessary as promi...
Marcel C. Castro, Peter Dely, Jonas Karlsson, Andr...
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 6 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
13 years 11 months ago
New Algorithm for Effective Utilization of Bandwidth for Sensitive Applications
In this paper, we propose an algorithm, which allocates the bandwidth in an effective manner for sensitive applications. The main idea of this work is to allocate more amount of b...
G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venka...
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
13 years 11 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
FGCN
2007
IEEE
126views Communications» more  FGCN 2007»
13 years 11 months ago
Traffic Splitting with Network Calculus for Mesh Sensor Networks
In many applications of sensor networks, it is essential to ensure that messages are transmitted to their destinations as early as possible and the buffer size of each sensor node...
Huimin She, Zhonghai Lu, Axel Jantsch, Li-Rong Zhe...
FGCN
2007
IEEE
121views Communications» more  FGCN 2007»
13 years 11 months ago
Supporting Multimedia Communication within an 802.11g Ad-hoc Network
By investigating the experimental results of the average throughput with the 802.11g ad-hoc mode, we have collected the different performance characteristics among the indoor, the ...
Chung-Wei Lee, Jonathan Liu, Kun Chen, Yu-Chee Tse...
FGCN
2007
IEEE
136views Communications» more  FGCN 2007»
13 years 11 months ago
Comparison of CP-OFDM and OFDM/OQAM in Doubly Dispersive Channels
In this paper we compare the performance of cyclic prefix based OFDM (CP-OFDM) systems and OFDM/offset QAM (OFDM/OQAM) systems in doubly dispersive channels, by investigating the...
Jinfeng Du, Svante Signell
FGCN
2007
IEEE
113views Communications» more  FGCN 2007»
13 years 11 months ago
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme
To keep the evidence that a stored hard disk does not modify its content, the intuitive scheme is to calculate a hash value of the data in all the sectors in a specific order. Ho...
Zoe L. Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu...