Sciweavers

7329 search results - page 1189 / 1466
» Network Extractor Protocols
Sort
View
IFIP
2003
Springer
15 years 10 months ago
A Novel Energy Efficient Communication Architecture for Bluetooth Ad Hoc Networks
Bluetooth is a promising wireless technology aiming at supporting electronic devices to be instantly interconnected into short-range ad hoc networks. The Bluetooth medium access co...
Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P....
IFIP
2003
Springer
15 years 10 months ago
Alleviating Effects of Mobility on TCP Performance in Ad Hoc Networks Using Signal Strength Based Link Management
Mobility in ad hoc networks causes link failures, which in turn result in packet losses. TCP attributes these losses to congestion. This results in frequent TCP retransmission time...
Fabius Klemm, Srikanth V. Krishnamurthy, Satish K....
ICCCN
2007
IEEE
15 years 6 months ago
Greedy Face Routing with Face ID Support in Wireless Networks
—Geographic face routing provides an attractive way for packet delivery in wireless networks due to its high reliability and low overhead. A good face routing protocol should pro...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
CSREASAM
2006
15 years 6 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
AAMAS
2006
Springer
15 years 4 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
« Prev « First page 1189 / 1466 Last » Next »