Sciweavers

Share
ICOIN
2005
Springer
8 years 10 months ago
On the Hidden Terminal Problem in Multi-rate Ad Hoc Wireless Networks
Multi-hop ad hoc wireless networks generally use the IEEE 802.11 Distributed Coordination Function (DCF) MAC protocol, which utilizes the request-to-send/clear-to-send (RTS/CTS) me...
Joon Yoo, Chongkwon Kim
ICOIN
2005
Springer
8 years 10 months ago
S-RO: Simple Route Optimization Scheme with NEMO Transparency
Network mobility (NEMO) basic support protocol maintains the connectivity when mobile router (MR) changes its point of attachment to the Internet by establishing a bidirectional tu...
Hanlim Kim, Geunhyung Kim, Cheeha Kim
ICOIN
2005
Springer
8 years 10 months ago
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities
O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, S...
ICOIN
2005
Springer
8 years 10 months ago
The Content-Aware Caching for Cooperative Transcoding Proxies
The Web is rapidly increasing its reach beyond the desktop to various devices and the transcoding proxy is appeared to support web services efficiently. Recently, the cooperative t...
Byoung-Jip Kim, Kyungbaek Kim, Daeyeon Park
ICOIN
2005
Springer
8 years 10 months ago
A New Congestion Control Mechanism of TCP with Inline Network Measurement
In this paper, we propose a novel congestion control mechanism of TCP, by using an inline network measurement technique. By using information of available bandwidth of a network pa...
Tomohito Iguchi, Go Hasegawa, Masayuki Murata
ICOIN
2005
Springer
8 years 10 months ago
A Rerouting Scheme with Dynamic Control of Restoration Scope for Survivable MPLS Network
This paper proposes a rerouting scheme that can be applied to the restoration of working Label Switched Paths (LSPs) and preprovisioned backup LSPs, which consists of two subsequen...
Daniel Won-Kyu Hong, Choong Seon Hong
ICOIN
2005
Springer
8 years 10 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
ICOIN
2005
Springer
8 years 10 months ago
DINPeer: Optimized P2P Communication Network
In this paper, we propose DINPeer middleware to overcome limitations in current peer-to-peer (P2P) overlay systems. DINPeer exploits a spiral-ring method to discover an inner ring ...
Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong, Ligang...
ICOIN
2005
Springer
8 years 10 months ago
Decreasing Mobile IPv6 Signaling with XCAST
Abstract. Mobile IPv6 is the IETF proposition to support host mobility in the Internet. It provides routing optimization for packets sent to the mobile node at the expense of signa...
Thierry Ernst
ICOIN
2005
Springer
8 years 10 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
books