Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
MSWIM
2006
ACM
10 years 10 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...
MSWIM
2006
ACM
10 years 10 months ago
Sampling time-dependent parameters in high-speed network monitoring
Nowadays network bandwidth is increasing continuously for endusers and network providers. Network monitoring tools have to be able to support these high-speed networks, processing...
Edurne Izkue, Eduardo Magaña
MSWIM
2006
ACM
10 years 10 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
MSWIM
2006
ACM
10 years 10 months ago
Estimation of perceived quality of service for applications on IPv6 networks
To provide high quality service to future Internet applications, IPv6 performance measurements are needed. However, to the best of our knowledge, IPv6 delay and loss performance e...
Xiaoming Zhou, Henk Uijterwaal, Robert E. Kooij, P...
MSWIM
2006
ACM
10 years 10 months ago
Establishing how many VoIP calls a wireless LAN can support without performance degradation
The use of Voice IP (VoIP) over wireless local area networks (WLAN) is a topic of great interest in the research arena. This paper attempts to answer the question: how many VoIP c...
Ángel Cuevas Rumín, Eur Ing Chris Gu...
MSWIM
2006
ACM
10 years 10 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
MSWIM
2006
ACM
10 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
MSWIM
2006
ACM
10 years 10 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
MSWIM
2006
ACM
10 years 10 months ago
Interference-constrained wireless coverage in a protocol model
We present an efficient algorithm to compute the coverage map of a given set of transmitters under interference constraints. That is, we compute the set of points that lie within ...
Prateek R. Kapadia, Om P. Damani
books