Sciweavers

630 search results - page 30 / 126
» Transparent Communication Management in Wireless Networks
Sort
View
MOBICOM
2000
ACM
15 years 2 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
65
Voted
NOMS
2008
IEEE
115views Communications» more  NOMS 2008»
15 years 4 months ago
A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks
—We propose a distributed monitoring scheme for an ad-hoc/MESH network topology, and design a Distributed Hash Table based Peer-to-Peer system to log the topology information. A ...
Cristian Popi, Olivier Festor
84
Voted
ICC
2008
IEEE
159views Communications» more  ICC 2008»
15 years 4 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
77
Voted
PADS
2005
ACM
15 years 3 months ago
An Adaptive Interest Management Scheme for Distributed Virtual Environments
Abstract— Traditionally Interest Management (IM) in distributed environments has been performed through a ‘top-down’ expression of interest patterns in the model. For many mo...
Rob Minson, Georgios K. Theodoropoulos
WS
2005
ACM
15 years 3 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...