Sciweavers

4376 search results - page 758 / 876
» Data Management in Sensor Networks
Sort
View
WS
2004
ACM
15 years 3 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
CIKM
2006
Springer
15 years 1 months ago
Topic evolution and social interactions: how authors effect research
We propose a method for discovering the dependency relationships between the topics of documents shared in social networks using the latent social interactions, attempting to answ...
Ding Zhou, Xiang Ji, Hongyuan Zha, C. Lee Giles
SIMUTOOLS
2008
14 years 11 months ago
Bridging UMTS and multicast routing in ns-2
In this paper, we present the design and the implementation of a novel scheme for the multicast transmission of data over Universal Mobile Telecommunications System (UMTS) network...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
WICON
2008
14 years 11 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
GRID
2006
Springer
14 years 10 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai