Sciweavers

722 search results - page 114 / 145
» Offering Mobile Security as a Service
Sort
View
TON
2008
108views more  TON 2008»
14 years 9 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
ETRICS
2006
15 years 1 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
ICMCS
2008
IEEE
134views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Performance measurements and evaluation of video streaming in HSDPA networks with 16QAM modulation
The High-Speed Downlink Packet Access (HSDPA) communication protocol improves downlink performance on mobile networks and is currently being deployed in networks around the world....
Haakon Riiser, Pål Halvorsen, Carsten Griwod...
WWIC
2007
Springer
247views Communications» more  WWIC 2007»
15 years 3 months ago
Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks
Vehicular ad-hoc networks (VANETs) offer a large number of new potential applications without relying on significant infrastructure. Many of these applications benefit from multi-h...
Maria Kihl, Mihail L. Sichitiu, Ted Ekeroth, Micha...
MATES
2004
Springer
15 years 3 months ago
From Modeling to Simulation of Multi-agent Systems: An Integrated Approach and a Case Study
Abstract. In this paper, an integrated approach for the modeling and the validation through simulation of multi-agent systems is proposed. The approach centers on the instantiation...
Giancarlo Fortino, Alfredo Garro, Wilma Russo