|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 25
reviews
|
|
|
|
|
|
|
|
Extending the Internet of Things to the future Internet through IPv6 support Jara A., Varakliotis S., Skarmeta A., Kirstein P. Mobile Information Systems 10(1): 3-17, 2014. Type: Article
This thought-provoking paper describes both practical experiments with a multi-protocol communications card and novel analytical mappings of Internet protocol version 6 (IPv6) addressing and dedicated link addressing such as KNX and IE...
|
Feb 9 2015 |
|
|
|
|
|
|
Investigating IPv6 traffic: What happened at the World IPv6 Day? Sarrar N., Maier G., Ager B., Sommer R., Uhlig S. PAM 2012 (Proceedings of the 13th International Conference on Passive and Active Measurement, Vienna, Austria, Mar 12-14, 2012) 11-20, 2012. Type: Proceedings
The next generation of protocols for the Internet is known as Internet protocol version 6 (IPv6). It represents a huge 96-bit increase over today’s IPv4 32-bit address space. This update is necessary to accommodate as many un...
|
Dec 26 2012 |
|
|
|
|
|
|
Understanding and measuring the urban pervasive infrastructure Kostakos V., Nicolai T., Yoneki E., O’Neill E., Kenn H., Crowcroft J. Personal and Ubiquitous Computing 13(5): 355-364, 2009. Type: Article
When describing complex phenomena such as the mobility of humans and devices in an urban area, it is not sufficient to employ limited models such as the random walk or random waypoint. Kostakos et al. propose modeling the urban pervasi...
|
Mar 24 2010 |
|
|
|
|
|
|
A comparison of single- and multi-hop beaconing in VANETs Mittag J., Thomas F., Härri J., Hartenstein H. VANET 2009 (Proceedings of the 6th ACM International Workshop on Vehicular Internetworking, Beijing, China, Sep 25, 2009) 69-78, 2009. Type: Proceedings
Vehicular area networks (VANETs) are particular deployments of wireless networks--the stations are placed in a linear topology, on vehicles along a highway. Beaconing is an important application for VANETs; each onboard statio...
|
Jan 4 2010 |
|
|
|
|
|
|
The problem of placing mobility anchor points in wireless mesh networks Wu L., Landfeldt B. MobiWac 2008 (Proceedings of the 6th ACM International Symposium on Mobility Management and Wireless Access, Vancouver, British Columbia, Canada, Oct 30-31, 2008) 19-27, 2008. Type: Proceedings
The mechanisms typically used in wireless mesh networks (WMNs) consider the random topology of nodes as a fundamental design requirement; for example, mobile ad hoc network (MANET) protocols such as radio-aware optimized link-state rou...
|
Apr 27 2009 |
|
|
|
|
|
|
Hierarchical routing over dynamic wireless networks Tschopp D., Diggavi S., Grossglauser M. SIGMETRICS 2008 (Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Annapolis, MD, Jun 2-6, 2008) 73-84, 2008. Type: Proceedings
This is a completely theoretical paper. It claims novelty by using the “doubling metric space” tool to analyze dynamic graphs--this tool was previously used on static networks....
|
Jan 30 2009 |
|
|
|
|
|
|
A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks Bamis A., Boukerche A., Chatzigiannakis I., Nikoletseas S. Computer Networks 52(1): 130-154, 2008. Type: Article
Not all routing protocols for ad hoc networks are created equal, and it is important to acknowledge their differences in order to better harness their advantages in certain types of deployments; this is the basic assumption made in thi...
|
Mar 31 2008 |
|
|
|
|
|
|
Network security Douligeris C., Serpanos D., John Wiley & Sons, 2005. 572 pp. Type: Book (9780471703556), Reviews: (1 of 2)
Judging only by its size (almost 600 pages, two editors, and 52 authors from nine countries), if all that can be said about network security isn’t included in this 2007 compendium, at least useful pointers to relevant referen...
|
Oct 5 2007 |
|
|
|
|
|
|
Bluetooth discovery time with multiple inquirers Peterson B., Baldwin R., Raines R. System sciences (Proceedings of the 39th Annual Hawaii International Conference on System Sciences,Jan 4-7, 2006) 232.12006. Type: Proceedings
For personal area networks containing small but numerous devices to become more widely deployed, there must be reliable automatic network discovery and formation mechanisms (often the devices work in a totally autonomous manner, withou...
|
Jun 14 2007 |
|
|
|
|
|
|
Advanced routing worm and its security challenges Zou C., Towsley D., Gong W., Cai S. SIMULATION 82(1): 75-85, 2006. Type: Article
In today’s Internet security context, most attacks are achieved by software worms replicating from host to host, and taking advantage of security holes in operating system software. Since most such hosts need to be connec...
|
Jan 8 2007 |
|
|
|
|
|
|
|
|
|
|
|