Sciweavers

211 search results - page 30 / 43
» The effect of cooperation at the network protocol level
Sort
View
160
Voted
ICDE
2007
IEEE
137views Database» more  ICDE 2007»
15 years 11 months ago
PASS Middleware for Distributed and Autonomous XML Message Processing
Basic message processing tasks, such as wellformedness checking and grammar validation, can be off-loaded from the service providers' own infrastructures. To enable effective...
Dirceu Cavendish, K. Selçuk Candan
ICC
2009
IEEE
14 years 7 months ago
OFDMA-TDD Networks with Busy Burst Enabled Grid-of-Beam Selection
Abstract--Interference aware user scheduling in fixed gridof-beam (GoB) transmission is envisaged to significantly benefit from the receiver initiated busy burst (BB) protocol. Fix...
Birendra Ghimire, Gunther Auer, Harald Haas
COMCOM
2008
145views more  COMCOM 2008»
14 years 9 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COMCOM
2007
129views more  COMCOM 2007»
14 years 9 months ago
Mobile object tracking in wireless sensor networks
— Wireless sensor network is an emerging technology that enables remote monitoring objects and environment. This paper proposes a protocol to track a mobile object in a sensor ne...
Hua-Wen Tsai, Chih-Ping Chu, Tzung-Shi Chen
MOBICOM
1996
ACM
15 years 1 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble