Sciweavers

463 search results - page 51 / 93
» Discovering communication
Sort
View
104
Voted
SIGCOMM
1997
ACM
15 years 4 months ago
End-to-end Internet Packet Dynamics
We discuss findings from a large-scale study of Internet packet dynamics conducted by tracing 20,000 TCP bulk transfers between 35 Internet sites. Because we traced each 100 Kbyt...
Vern Paxson
AUTONOMICS
2007
ACM
15 years 4 months ago
Adaptive learning of semantic locations and routes
Abstract. Adaptation of devices and applications based on contextual information has a great potential to enhance usability and mitigate the increasing complexity of mobile devices...
Keshu Zhang, Haifeng Li, Kari Torkkola, Mike Gardn...
CNSR
2004
IEEE
15 years 4 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
124
Voted
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 2 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
74
Voted
BCSHCI
2007
15 years 1 months ago
Bluetooth friendly names: bringing classic HCI questions into the mobile space
We explore the use of Bluetooth friendly names within the mobile space. Each Bluetooth-enabled device possesses a short string known as a ‘friendly name’ used to help identify...
Barry Lavelle, Daragh Byrne, Gareth J. F. Jones, A...