Sciweavers

1692 search results - page 302 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ATAL
2009
Springer
15 years 4 months ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...
EURONGI
2005
Springer
15 years 5 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
MOBIHOC
2001
ACM
15 years 11 months ago
A comparison of TCP performance over three routing protocols for mobile ad hoc networks
We examine the performance of the TCP protocol for bulkdata transfers in mobile ad hoc networks (MANETs). We vary the number of TCP connections and compare the performances of thr...
Thomas D. Dyer, Rajendra V. Boppana
NETWORK
2006
116views more  NETWORK 2006»
14 years 11 months ago
Quality of service support in IEEE 802.16 networks
During the last few years, users all over the world have become more and more accustomed to the availability of broadband access. This has boosted the use of a wide variety both o...
Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi...
APSCC
2008
IEEE
15 years 6 months ago
Analysis of Context-Aware Network Selection Schemes for Power Savings
Socio-technical developments in computing have resulted in the emergence of innovative mobile systems which exploit the information available on the Internet to optimize the perfo...
Pravin Pawar, Bert-Jan van Beijnum, Hermie Hermens...