Sciweavers

2362 search results - page 371 / 473
» The wireless network jamming problem
Sort
View
DIMVA
2006
15 years 6 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
LCN
2007
IEEE
15 years 11 months ago
Semi-Split TCP: Maintaining End-to-End Semantics for Split TCP
—It has long been acknowledged that TCP performance suffers in hybrid networks. A Split TCP approach has been proposed to address this problem. In this approach, a proxy is emplo...
Fei Xie, Ning Jiang, Yao Hua Ho, Kien A. Hua
PERCOM
2009
ACM
16 years 5 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
WINE
2005
Springer
155views Economy» more  WINE 2005»
15 years 10 months ago
Economic Analysis of Networking Technologies for Rural Developing Regions
Abstract. Providing network connectivity to rural regions in the developing world is an economically challenging problem especially given the low income levels and low population d...
Shridhar Mubaraq Mishra, John Hwang, Dick Filippin...
PERCOM
2005
ACM
16 years 4 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni