Sciweavers

291 search results - page 46 / 59
» Effect of node mobility on highway mobile infostation networ...
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
MOBIHOC
2009
ACM
15 years 10 months ago
Multicasting in delay tolerant networks: a social network perspective
Node mobility and end-to-end disconnections in Delay Tolerant Networks (DTNs) greatly impair the effectiveness of data dissemination. Although social-based approaches can be used ...
Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao
ISCC
2008
IEEE
171views Communications» more  ISCC 2008»
15 years 4 months ago
The operation mode selection in FMIPv6
The Fast Handover for Mobile IPv6 (FMIPv6) [2] aims at reducing the long handover latency in Mobile IPv6 [1] by fast movement detection and fast binding update. Furthermore, it al...
Bin Liu, Philippe Martins, Philippe Bertin
103
Voted
JPDC
2007
191views more  JPDC 2007»
14 years 9 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia
TMC
2008
120views more  TMC 2008»
14 years 9 months ago
Mitigating Performance Degradation in Congested Sensor Networks
Data generated in wireless sensor networks may not all be alike: some data may be more important than others and hence may have different delivery requirements. In this paper, we a...
Raju Kumar, Riccardo Crepaldi, Hosam Rowaihy, Albe...