The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: software engineering; artificial intelligence; parallel computing; and distributed computing; cryptography; collaborative computing; network security; data mining; image processing; signal processing; speech processing; Internet technology; mobile network; wireless network; ad hoc network; natural language processing; neural network; genetic algorithm; service-oriented...
The following topics are dealt with: performance modelling; routing mechanism; distributed systems; parallel systems; service oriented architecture; communication technology; protocols; autonomic network systems; Internet computing; ad hoc networks; wireless sensor networks; privacy management; mobile networks; multimedia systems; pervasive computing; ubiquitous computing; security intrusion detection;...
Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. In this paper,...
In virtue of its widespread application scenarios, especially in battlefield communication, disaster rescue, satellite and deep-space transmission, Delay-disruption Tolerant Network (hereinafter referred to as DTN) has become one of the most attractive focuses in research for future Internet. Due to the intermittent connectivity, mobility of nodes, signal interference, jamming in DTN, there exist...
Reduction of overhead is essential in increasing the scalability and power efficiency of peer-to-peer (P2P) file sharing systems for mobile ad hoc networks (MANET). Previously researchers mainly focused on reducing overhead of query process, and paid little attention to file transfer process. This paper presents a cluster-based P2P file sharing protocol for MANET, focusing on file transfer process...
To enable seamless integration of ad hoc networks with other Infrastructure LANs and to the Internet, TCP seems to be the natural choice for users of ad hoc networks that want to communicate reliably with each other and with the Internet. It is well-known that due to the nature of multi-hop wireless Ad hoc network applications, TCP throughput instability can have a devastating impact on the QoS requirements...
Wireless mesh networking (WMN), the static mesh routers (MRs) cooperatively relay each other packets to the Internet Gateway (IGW). The routing protocols assume all the nodes in the network to be non-malicious. However, the open architecture of WMNs paves way to malicious attackers who can exploit hidden loopholes in the routing protocol. In this paper, we mainly focus on the vulnerability of the...
Recent years, the mobile ad hoc networks (MANETs) research community has been very active. Thus, it is of growing importance to build distributed network applications on top of MANETs. DHT is known as a popular technique to build efficient distributed applications in the Internet. However, in MANETs, DHT needs to consider network traffics, moving of nodes and energy efficiency more carefully than...
Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. The Integration of the MANETs and infrastructure networks such as Internet extends the network coverage and increases the application domain of the MANET. Communication between a mobile device in an ad hoc network and a fixed device on the Internet is achieved using gateways, which acts as...
In this paper, we propose a timestamp series approach to defend against Sybil attack in a vehicular ad hoc network (VANET) based on roadside unit support. The proposed approach targets the initial deployment stage of VANET when basic roadside unit (RSU) support infrastructure is available and a small fraction of vehicles have network communication capability. Unlike previously proposed schemes that...
In mobile social networks (MSN) individuals with similar interests or commonalities connect to each other using the mobile phones. MSN are special kind of ad-hoc networks in which wireless connectivity (i.e. encounters and re-encounters) with social peers is predictable. Most of the recent research proposes routing framework to exploit these predictable patterns to identify the best information carriers...
Rapid advances in the areas of computing, sensing, and communications have enabled vehicle manufactures to provide new features for vehicles to enhance safety, pleasure, convenience, and reliability. Moreover future vehicles are expected to become a part of the Internet, either as a network node, or as a hub constructing a vehicular ad hoc network. This vehicular ad hoc network represents large dynamic...
The main contribution of this article is to propose a collaborative and distributed cache mechanism tailored for ad hoc networks. Each node's cache is partitioned into a shared area and a private area. The proposed collaborative cache is formed by each node's shared area, which is used to store contents relevant to the group, while the private area is used to store information relevant to its owner...
A fair non-repudiation security protocol can provide non-repudiation proof for two parts of the exchange at the same time, or both get nothing. But many protocols performed weak in logical analysis. In this paper, a group of new protocols(with 3 sub-protocols) with off-line The Third Party(TTP) are presented. We analysis them with a new Kailar logic analytical method. Finally, the proposed protocols...
The following topics are dealt with: data mining; genetic algorithm; software engineering; Web applications; information management; data management; wireless networks; databases; neural networks; ad hoc networks; real time systems; social network; security; multimedia; multi-agent system; artificial intelligence; distributed systems; parallel systems.
Wireless mesh networks are mobile communication networks where the nodes may have fixed or mobile relative position among each other. The application range is large, they can be used either as a sensor network or connected to Internet through gateways. The communication is carried over low power and low range wireless channels, so its necessary a multi hop routing. The Better Directed Progression...
Wireless mesh networks (WMN) are considered an attractive alternative to the traditional wired backbone networks for broadband Internet access. However, their capacity is limited due to the nature of the radio channel, which must be shared by the nodes forwarding the traffic from and to the gateway. Therefore, estimating the capacity of WMNs is an important question. The capacity analysis proposed...
The following topics are dealt with: peer-to-peer computing; ubiquitous computing; security of data; mobile ad hoc computer; wireless sensor network; protocols; data mining; distance learning; ID based broadcast signcryption scheme; and service-oriented architecture.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.