Sciweavers

1660 search results - page 267 / 332
» Forwarding in a content-based network
Sort
View
ICNP
2006
IEEE
15 years 5 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
CSB
2005
IEEE
202views Bioinformatics» more  CSB 2005»
15 years 5 months ago
Head and Neck Cancer Metastasis Prediction via Artificial Neural Networks
Cancers in head and neck tends to spread to nearby lymph nodes. Lymph nodes trap the spreading tumor cells but then the tumor starts to grow in these nodes and then spread further...
Eveleen Darby, Tezeswari Nettimi, Shilpa Kodali, L...
WOWMOM
2005
ACM
132views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Comparisons of Inter-Domain Routing Schemes for Heterogeneous Ad Hoc Networks
— In this paper, we propose three interdomain routing schemes for communications between different ad-hoc groups (subnets), namely the implicit foreign degree based (IFD), the ex...
Wenbin Ma, Mooi Choo Chuah
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 5 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
MONET
2008
150views more  MONET 2008»
14 years 11 months ago
A Multi-radio 802.11 Mesh Network Architecture
Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the bene...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...