Sciweavers

2485 search results - page 407 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
155
Voted
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 3 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
TRIDENTCOM
2006
IEEE
15 years 9 months ago
CMT II: An agent based framework for comprehensive IP measurements
— The Communication Measurement Tool II (CMT II) is a framework for comprehensive IP measurements. It is the next development stage of the succeeded measurement framework called ...
Thomas Pfeiffenberger, Thomas Fichtel
149
Voted
JNW
2006
149views more  JNW 2006»
15 years 3 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
MIDDLEWARE
2005
Springer
15 years 9 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
154
Voted
WICON
2008
15 years 4 months ago
The effect of cooperation at the network protocol level
Abstract--There has been a great deal of attention on cooperative communication which exploits the spatial diversity among antennas belonging to multiple terminals. Most of the exi...
Beiyu Rong, Anthony Ephremides