Sciweavers

76 search results - page 14 / 16
» percom 2005
Sort
View
PERCOM
2005
ACM
14 years 5 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
PERCOM
2005
ACM
14 years 5 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2005
ACM
14 years 5 months ago
PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems
In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These devices must be able to discover and share ser...
Andrés Marín López, Carlos Ga...
PERCOM
2005
ACM
14 years 5 months ago
REDMAN: A Decentralized Middleware Solution for Cooperative Replication in Dense MANETs
The mass market of wireless devices is pushing towards service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as university campuses,...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
PERCOM
2005
ACM
14 years 5 months ago
Adaptive Location Management Scheme for Mobile IP
Mobile IP is a common standard to support global mobility of mobile hosts (MHs). One of the major problems for the Mobile IP is frequent location update and high signaling overhea...
Ha Won Kim, Sung Je Hong, Jong Kim