Sciweavers

890 search results - page 103 / 178
» Distributed Connectivity Control of Mobile Networks
Sort
View
INFOCOM
2010
IEEE
14 years 10 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
ICMB
2005
IEEE
114views Business» more  ICMB 2005»
15 years 5 months ago
WLAN Communities and Internet Access Sharing: A Regulatory Overview
The widespread adoption of wireless LAN has paved the way for the emergence of a compelling alternative to cellular networks for obtaining Internet access on the move. This has ge...
Giovanni Camponovo, Davide Cerutti
MICRO
2006
IEEE
105views Hardware» more  MICRO 2006»
15 years 5 months ago
Distributed Microarchitectural Protocols in the TRIPS Prototype Processor
Growing on-chip wire delays will cause many future microarchitectures to be distributed, in which hardware resources within a single processor become nodes on one or more switched...
Karthikeyan Sankaralingam, Ramadass Nagarajan, Rob...
NCA
2007
IEEE
15 years 6 months ago
Impact of request dispatching granularity in geographically distributed Web systems
The advent of the mobile Web and the increasing demand for personalized contents arise the need for computationally expensive services, such as dynamic generation and on-thefly a...
Mauro Andreolini, Claudia Canali, Riccardo Lancell...
NOSSDAV
2009
Springer
15 years 6 months ago
A delaunay triangulation architecture supporting churn and user mobility in MMVEs
This article proposes a new distributed architecture for update message exchange in massively multi-user virtual environments (MMVE). MMVE applications require delivery of updates...
Mohsen Ghaffari, Behnoosh Hariri, Shervin Shirmoha...