Sciweavers

1624 search results - page 301 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
119
Voted
ICN
2009
Springer
14 years 11 months ago
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits
It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitore...
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
141
Voted
ACISP
2006
Springer
15 years 5 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
106
Voted
ETFA
2006
IEEE
15 years 7 months ago
Towards a File System Interface for Mobile Resources in Networked Embedded Systems
— Networks for real-time embedded systems are a key emerging technology for current and future systems. Such networks need to enable reliable communication without requiring sign...
Neil C. Audsley, R. Gao, Ameet Patil
SUTC
2008
IEEE
15 years 8 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
NOMS
2006
IEEE
119views Communications» more  NOMS 2006»
15 years 7 months ago
Runtime Semantic Interoperability for Gathering Ontology-based Network Context
—The trends for pushing more operational intelligence towards network elements to achieve more context-aware and self-managing behavior often requires elements to gather network ...
John Keeney, David Lewis, Declan O'Sullivan, Antoi...