Sciweavers

3031 search results - page 320 / 607
» SNMS - Shadow Network Management System
Sort
View
125
Voted
SAC
2004
ACM
15 years 10 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
MDM
2004
Springer
15 years 10 months ago
Prediction-Based Strategies for Energy Saving in Object Tracking Sensor Networks
In order to fully realize the potential of sensor networks, energy awareness should be incorporated into every stage of the network design and operation. In this paper, we address...
Yingqi Xu, Julian Winter, Wang-Chien Lee
SECON
2010
IEEE
15 years 2 months ago
A Robust Push-To-Talk Service for Wireless Mesh Networks
Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other while using a si...
Yair Amir, Raluca Musaloiu-Elefteri, Nilo Rivera
INFOCOM
2010
IEEE
15 years 3 months ago
Stable Maximum Throughput Broadcast in Wireless Fading Channels
—This research considers network coded broadcast system with multi-rate transmission and dual queue stability constraints. Existing network coded broadcast systems consider singl...
Wei Pu, Hao Cui, Chong Luo, Feng Wu, Chang Wen Che...
WWW
2008
ACM
16 years 5 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth