Sciweavers

5079 search results - page 890 / 1016
» Hidden-Action in Network Routing
Sort
View
ICON
2007
IEEE
15 years 4 months ago
Fast Duplicate Address Detection for Mobile IPv6
Several components contribute to handover delay of Mobile IPv6, namely, movement detection time, address configuration time, binding registration time, and route optimization time....
Panita Pongpaibool, Pahol Sotthivirat, Sukumal I. ...
EUROSSC
2007
Springer
15 years 4 months ago
Inferring and Distributing Spatial Context
An increasing number of computationally enhanced objects is distributed around us in physical space, which are equipped – or at least can be provided – with sensors for measuri...
Clemens Holzmann
IPSN
2007
Springer
15 years 4 months ago
Active sensing platform for wireless structural health monitoring
This paper presents SHiMmer, a wireless platform for sensing and actuation that combines localized processing with energy harvesting to provide long-lived structural health monito...
D. Musiani, K. Lin, Tajana Simunic Rosing
VLDB
2007
ACM
135views Database» more  VLDB 2007»
15 years 4 months ago
Self-Organizing Schema Mappings in the GridVine Peer Data Management System
GridVine is a Peer Data Management System based on a decentralized access structure. Built following the principle of data independence, it separates a logical layer – where dat...
Philippe Cudré-Mauroux, Suchit Agarwal, Adr...
DSN
2006
IEEE
15 years 4 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim