Sciweavers

CONEXT
2007
ACM
15 years 9 months ago
A networked virtual environment over KAD
Matteo Varvello, Ernst Biersack, Christophe Diot
CONEXT
2007
ACM
15 years 9 months ago
The diameter of opportunistic mobile networks
Portable devices have more data storage and increasing communication capabilities everyday. In addition to classic infrastructure based communication, these devices can exploit hu...
Augustin Chaintreau, Abderrahmen Mtibaa, Laurent M...
140
Voted
CONEXT
2007
ACM
15 years 9 months ago
Securing BGP incrementally
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it bec...
Martin Suchara, Ioannis C. Avramopoulos, Jennifer ...
CONEXT
2007
ACM
15 years 9 months ago
Can active tracking of inroamer location optimise a live GSM network?
The mobile communication industry has experienced huge growth in recent years, which amplified the competition among telecommunication companies. This inspired the search for new ...
Katerina Dufková, Jirí Danihelka, Mi...
CONEXT
2007
ACM
15 years 9 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...