The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the advances in cellular devices and mobile technologies, now it has become possible to host Web Services (WS) on mobile devices. Web services have a broad range of service clients, whereas mobile phones have a large and expanding number of user bases. Therefore, combining these two trends by exploiting mobile devices as service providers is a promising next step. However, the usability, reliability,...
Network mobility is proposed to let a mobile network change its point of attachment and still keep all nodes attached to the mobile network globally reachable. However, due to finite bandwidth, limited signaling coverage and frequent link failure, a mobile network needs multihoming to access the Internet simultaneously on the perspective of performance and reliability. In this paper, we extends our...
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essential...
In this paper we present an overview of the sensor network architecture as developed in the ANGEL project. We first specify the particular requirements found in healthcare and assisted-living applications, then introduce the general reference architecture and finally discuss some security-related aspects.
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.