Sciweavers

2904 search results - page 440 / 581
» Internet Infrastructure Security
Sort
View
133
Voted
IPCCC
2005
IEEE
15 years 9 months ago
DualRTT: detecting spurious timeouts in wireless mobile environments
Abstract— Retransmission ambiguity, arising from delay spikes in a wireless mobile environment, results in poor TCP performance. Eifel improves the performance of TCP by using th...
Shaojian Fu, Mohammed Atiquzzaman
126
Voted
LCN
2005
IEEE
15 years 9 months ago
MAPNaS: A Lightweight, Locality-Aware Peer-to-Peer Based Name Service for MANETs
Name services for mobile ad hoc networks are essential to discover and bind resources given by their name or URI to a specific network address. As there is no fixed infrastructure...
Thomas Zahn, Jochen H. Schiller
117
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Proxy-based Hand-off of Web Sessions for User Mobility
The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal ...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...
147
Voted
WONS
2005
IEEE
15 years 9 months ago
Broadcasting in Hybrid Ad Hoc Networks
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular a...
François Ingelrest, David Simplot-Ryl, Ivan...
127
Voted
APWEB
2005
Springer
15 years 9 months ago
Collaborative Web Application for Flood Control System of Reservoirs
Flood control for reservoirs require operations in a dynamic and cooperative manner in order to respond to the changing flood control conditions. There is an increasing emphasis on...
Chuntian Cheng, Kwok-wing Chau, Gang Li, Xiang-Yan...