Sciweavers

1440 search results - page 61 / 288
» Mobility Model for Tactical Networks
Sort
View
SAC
2009
ACM
15 years 11 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
PODC
2004
ACM
15 years 10 months ago
Computation in networks of passively mobile finite-state sensors
We explore the computational power of networks of small resource-limited mobile agents. We define two new models of computation based on pairwise interactions of finite-state ag...
Dana Angluin, James Aspnes, Zoë Diamadi, Mich...
AINA
2004
IEEE
15 years 8 months ago
A Mathematical Model for Analyzing the Proxy Bidding Method for Mobile Agent-Based Auction Services
This paper presents an auction system based on mobile agents. By using a proxy server, a user can generate a mobile auction agent by giving the bidding information, including the ...
Jie Zhang, Henry C. B. Chan
CSE
2009
IEEE
15 years 11 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
137
Voted
WIOPT
2006
IEEE
15 years 11 months ago
Capacity region, minimum energy and delay for a mobile ad-hoc network
Abstract— We investigate two quantities of fundamental interest in a mobile ad-hoc network: the capacity region and the minimum energy function of the network. The capacity regio...
Rahul Urgaonkar, Michael J. Neely