Sciweavers

630 search results - page 30 / 126
» Transparent Communication Management in Wireless Networks
Sort
View
MOBICOM
2000
ACM
15 years 9 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
NOMS
2008
IEEE
115views Communications» more  NOMS 2008»
15 years 11 months ago
A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks
—We propose a distributed monitoring scheme for an ad-hoc/MESH network topology, and design a Distributed Hash Table based Peer-to-Peer system to log the topology information. A ...
Cristian Popi, Olivier Festor
ICC
2008
IEEE
159views Communications» more  ICC 2008»
15 years 11 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
PADS
2005
ACM
15 years 11 months ago
An Adaptive Interest Management Scheme for Distributed Virtual Environments
Abstract— Traditionally Interest Management (IM) in distributed environments has been performed through a ‘top-down’ expression of interest patterns in the model. For many mo...
Rob Minson, Georgios K. Theodoropoulos
WS
2005
ACM
15 years 11 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...