Sciweavers

1017 search results - page 183 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
CORR
2007
Springer
138views Education» more  CORR 2007»
14 years 9 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
COOPIS
2002
IEEE
15 years 2 months ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
IMC
2010
ACM
14 years 7 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
MOBIHOC
2009
ACM
15 years 10 months ago
Multicasting in delay tolerant networks: a social network perspective
Node mobility and end-to-end disconnections in Delay Tolerant Networks (DTNs) greatly impair the effectiveness of data dissemination. Although social-based approaches can be used ...
Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao
WICOMM
2002
121views more  WICOMM 2002»
14 years 9 months ago
Open issues on TCP for mobile computing
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (...
Vassilios Tsaoussidis, Ibrahim Matta