Sciweavers

5234 search results - page 750 / 1047
» Simulation of Computer Network Attacks
Sort
View
ADHOCNOW
2008
Springer
15 years 11 months ago
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simpl...
Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 11 months ago
Range-based Mobility Estimations in MANETs with Application to Link Availability Prediction
— The quality of communications in mobile ad-hoc networks is largely determined by the topological stability. Characterizing the mobility of mobile nodes (e.g. how often they mov...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
RTSS
2007
IEEE
15 years 11 months ago
Distributed Minimal Time Convergecast Scheduling for Small or Sparse Data Sources
— Many applications of sensor networks require the base station to collect all the data generated by sensor nodes. As a consequence many-to-one communication pattern, referred to...
Ying Zhang, Shashidhar Gandham, Qingfeng Huang
ICWMC
2006
IEEE
15 years 11 months ago
Design and Evaluation of eTIMIP - an Overlay Micro-Mobility Architecture based on TIMIP
All the proposed IP mobility protocols assume that the mobile nodes always have a mobility-aware IP stack. On the other hand, efficient micro-mobility solutions entail specific to...
Pedro Vale Estrela, Teresa Maria Vazão, M&a...
ICNP
2005
IEEE
15 years 10 months ago
Path Vector Face Routing: Geographic Routing with Local Face Information
Existing geographic routing algorithms depend on the planarization of the network connectivity graph for correctness, and the planarization process gives rise to a welldefined no...
Ben Leong, Sayan Mitra, Barbara Liskov