Sciweavers

347 search results - page 55 / 70
» Common Gateway Architecture for Mobile Ad-Hoc Networks
Sort
View
160
Voted
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 2 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
NOSSDAV
2001
Springer
15 years 3 months ago
Towards junking the PBX: deploying IP telephony
We describe the architecture and implementation of our Internet telephony test-bed intended to replace the departmental PBX (telephone switch). It interworks with the traditional ...
Wenyu Jiang, Jonathan Lennox, Henning Schulzrinne,...
98
Voted
PERCOM
2011
ACM
14 years 2 months ago
RegReS: Adaptively maintaining a target density of regional services in opportunistic vehicular networks
Abstract—Pervasive vehicle-mounted mobile devices are increasingly common, and can be viewed as a large-scale ad hoc network on which collaborative, location-based services can b...
Emmanouil Koukoumidis, Li-Shiuan Peh, Margaret Mar...
109
Voted
IWCMC
2006
ACM
15 years 4 months ago
Optimal hierarchical energy efficient design for MANETs
Due to the growing interest in mobile wireless Ad-Hoc networks’ (MANETs) applications, researchers have proposed many routing protocols that differ in their objective. Energy ef...
Wasim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuqa...
INFOCOM
2009
IEEE
15 years 5 months ago
Using NEMO to Support the Global Reachability of MANET Nodes
—Mobile Ad hoc Network (MANET) routing protocols have been the focus of an accomplished research effort for many years within the networking community and now the results of this...
Ben McCarthy, Christopher Edwards, Martin Dunmore