Sciweavers

644 search results - page 74 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
MOBIHOC
2004
ACM
15 years 5 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
RAID
2004
Springer
15 years 5 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
AIIDE
2007
15 years 2 months ago
A Demonstration of ScriptEase Motivational Ambient and Latent Behaviors for Computer RPGs
This demonstration describes the generation of ambient and latent NPC behavior scripts using generative behavior patterns with ScriptEase. Our behavior model supports behavior rol...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
HPCC
2007
Springer
15 years 6 months ago
A Generic Minimum Dominating Forward Node Set Based Service Discovery Protocol for MANETs
Abstract. Service discovery is a crucial feature for the usability of mobile ad-hoc networks (MANETs). In this paper, Minimum Dominating Forward Node Set based Service Discovery Pr...
Zhen-guo Gao, Sheng Liu, Mei Yang, Jinhua Zhao, Ji...
CCR
2008
91views more  CCR 2008»
14 years 12 months ago
Serial experiments online
Current network protocols must comply with rigid interfaces and rules of behavior to fit into well defined, vertical protocol stacks. It is difficult for network designers to offe...
Juan J. Ramos-Muñoz, Lidia Yamamoto, Christ...