Sciweavers

Share
ICT
2004
Springer
147views Communications» more  ICT 2004»
9 years 5 months ago
A Heuristic Approach to Energy Saving in Ad Hoc Networks
This paper presents a new algorithm, Extra, for extending the lifetime of ad hoc networks. Extra tries to conserve energy by identifying and switching off nodes that are momentaril...
R. I. da Silva, Julius C. B. Leite, M. P. Fernande...
ICT
2004
Springer
158views Communications» more  ICT 2004»
9 years 5 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
ICT
2004
Springer
123views Communications» more  ICT 2004»
9 years 5 months ago
PRDS: A Priority Based Route Discovery Strategy for Mobile Ad Hoc Networks
Bosheng Zhou, Alan Marshall, Jieyi Wu, Tsung-Han L...
ICT
2004
Springer
110views Communications» more  ICT 2004»
9 years 5 months ago
Priority Telephony System with Pricing Alternatives
Dynamic pricing schemes in telecommunication networks were traditionally employed to create users’ incentives in such a way that the overall utilization is improved and profits a...
Saravut Yaipairoj, Fotios C. Harmantzis
ICT
2004
Springer
139views Communications» more  ICT 2004»
9 years 5 months ago
A XML Policy-Based Approach for RSVP
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Emir Toktar, Edgard Jamhour, Carlos Maziero
ICT
2004
Springer
106views Communications» more  ICT 2004»
9 years 5 months ago
Script MIB Extension for Resource Limitation in SNMP Distributed Management Environments
Abstract. Resource limitation on management scripts has been an important requirement for distributed management environments. This article proposes a Script MIB extension with new...
A. da Rocha, C. Amon da Rocha, José Neuman ...
ICT
2004
Springer
127views Communications» more  ICT 2004»
9 years 5 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
ICT
2004
Springer
128views Communications» more  ICT 2004»
9 years 5 months ago
SRBQ and RSVPRAgg: A Comparative Study
Abstract This paper presents a comparative evaluation of the Scalable ReservationBased QoS (SRBQ) and the RSVP Reservation Aggregation (RSVPRAgg) architectures, both designed to pr...
Rui Prior, Susana Sargento, Pedro Brandão, ...
ICT
2004
Springer
181views Communications» more  ICT 2004»
9 years 5 months ago
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS
Abstract. This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion reco...
F. S. de Paula, P. L. de Geus
ICT
2004
Springer
120views Communications» more  ICT 2004»
9 years 5 months ago
Scalable End-to-End Multicast Tree Fault Isolation
We present a novel protocol, M3L, for multicast tree fault isolation based purely upon end-to-end information. Here, a fault is a link with a loss rate exceeding a specified thres...
Timur Friedman, Donald F. Towsley, James F. Kurose
books