Sciweavers

ICPPW
2003
IEEE
13 years 9 months ago
Constructing Nondominated Local Coteries for Distributed Resource Allocation
The resource allocation problem is a fundamental problem in distributed systems. In this paper, we focus on constructing nondominated (ND) local coteries to solve the problem. Dis...
Jehn-Ruey Jiang, Cheng-Sheng Chou, Shing-Tsaan Hua...
ICPPW
2003
IEEE
13 years 9 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
ICPPW
2003
IEEE
13 years 9 months ago
Countering Rogues in Wireless Networks
Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and Man-in-the-middle attacks (MITM). In this paper we show how wireless networks are...
Austin Godber, Partha Dasgupta
ICPPW
2003
IEEE
13 years 9 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
ICPPW
2003
IEEE
13 years 9 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...