Sciweavers

Share
ICDCSW
2005
IEEE
8 years 10 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
ICDCSW
2005
IEEE
8 years 10 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
ICDCSW
2005
IEEE
8 years 10 months ago
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment
We have built a router testbed that is connected to the Deter/Emist experimental infrastructure. Our goal is to create a semi-realistic testbed to conduct BGP experiments, measure...
Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon...
ICDCSW
2005
IEEE
8 years 10 months ago
Capacity Estimation of Non-Synchronous Covert Channels
Capacity estimation is an important part of covert channel analysis. It measures the severity of a covert channel by estimating the maximum information rate attainable over it. Tr...
Zhenghong Wang, Ruby B. Lee
ICDCSW
2005
IEEE
8 years 10 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
ICDCSW
2005
IEEE
8 years 10 months ago
Integrating Databases with Publish/Subscribe
Publish/subscribe is emerging as an appropriate communication paradigm for large-scale, widely-distributed systems. In this paper, we describe our work on integrating active datab...
Luis Vargas, Jean Bacon, Ken Moody
ICDCSW
2005
IEEE
8 years 10 months ago
iMobif: An Informed Mobility Framework for Energy Optimization in Wireless Ad Hoc Networks
Recent research results show that a wireless ad hoc network can exploit controlled node mobility to reduce communication energy consumption. Node movement, however, may consume a ...
Chiping Tang, Philip K. McKinley
ICDCSW
2005
IEEE
8 years 10 months ago
An Extended Directional MAC for Location Information Staleness in Ad Hoc Networks
Recently, several directional MAC protocols using smart antennas or directional antennas have been proposed for wireless ad hoc networks including our proposed MAC protocol called...
Masanori Takata, Masaki Bandai, Takashi Watanabe
ICDCSW
2005
IEEE
8 years 10 months ago
Measurement-Based Peer-to-Peer Grouping for Networked Virtual Environment
Networked games are newly emerging and increasing applications in the Internet community. Multiplayer Online Game (MOG) is one of such applications that can accommodate many users...
Hajime Sogawa, Niwat Thepvilojanapong, Hiroki Sait...
books