Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Petrescu, Alexandre
CEA
Saclay, France
 
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 25 reviews

   
  Extending the Internet of Things to the future Internet through IPv6 support
Jara A., Varakliotis S., Skarmeta A., Kirstein P. Mobile Information Systems 10(1): 3-17, 2014.  Type: Article

This thought-provoking paper describes both practical experiments with a multi-protocol communications card and novel analytical mappings of Internet protocol version 6 (IPv6) addressing and dedicated link addressing such as KNX and IE...

Feb 9 2015  
  Investigating IPv6 traffic: What happened at the World IPv6 Day?
Sarrar N., Maier G., Ager B., Sommer R., Uhlig S.  PAM 2012 (Proceedings of the 13th International Conference on Passive and Active Measurement, Vienna, Austria, Mar 12-14, 2012) 11-20, 2012.  Type: Proceedings

The next generation of protocols for the Internet is known as Internet protocol version 6 (IPv6). It represents a huge 96-bit increase over today’s IPv4 32-bit address space. This update is necessary to accommodate as many un...

Dec 26 2012  
  Understanding and measuring the urban pervasive infrastructure
Kostakos V., Nicolai T., Yoneki E., O’Neill E., Kenn H., Crowcroft J. Personal and Ubiquitous Computing 13(5): 355-364, 2009.  Type: Article

When describing complex phenomena such as the mobility of humans and devices in an urban area, it is not sufficient to employ limited models such as the random walk or random waypoint. Kostakos et al. propose modeling the urban pervasi...

Mar 24 2010  
  A comparison of single- and multi-hop beaconing in VANETs
Mittag J., Thomas F., Härri J., Hartenstein H.  VANET 2009 (Proceedings of the 6th ACM International Workshop on Vehicular Internetworking, Beijing, China, Sep 25, 2009) 69-78, 2009.  Type: Proceedings

Vehicular area networks (VANETs) are particular deployments of wireless networks--the stations are placed in a linear topology, on vehicles along a highway. Beaconing is an important application for VANETs; each onboard statio...

Jan 4 2010  
  The problem of placing mobility anchor points in wireless mesh networks
Wu L., Landfeldt B.  MobiWac 2008 (Proceedings of the 6th ACM International Symposium on Mobility Management and Wireless Access, Vancouver, British Columbia, Canada, Oct 30-31, 2008) 19-27, 2008.  Type: Proceedings

The mechanisms typically used in wireless mesh networks (WMNs) consider the random topology of nodes as a fundamental design requirement; for example, mobile ad hoc network (MANET) protocols such as radio-aware optimized link-state rou...

Apr 27 2009  
  Hierarchical routing over dynamic wireless networks
Tschopp D., Diggavi S., Grossglauser M.  SIGMETRICS 2008 (Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Annapolis, MD, Jun 2-6, 2008) 73-84, 2008.  Type: Proceedings

This is a completely theoretical paper. It claims novelty by using the “doubling metric space” tool to analyze dynamic graphs--this tool was previously used on static networks....

Jan 30 2009  
  A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks
Bamis A., Boukerche A., Chatzigiannakis I., Nikoletseas S. Computer Networks 52(1): 130-154, 2008.  Type: Article

Not all routing protocols for ad hoc networks are created equal, and it is important to acknowledge their differences in order to better harness their advantages in certain types of deployments; this is the basic assumption made in thi...

Mar 31 2008  
  Network security
Douligeris C., Serpanos D., John Wiley & Sons, 2005. 572 pp.  Type: Book (9780471703556), Reviews: (1 of 2)

Judging only by its size (almost 600 pages, two editors, and 52 authors from nine countries), if all that can be said about network security isn’t included in this 2007 compendium, at least useful pointers to relevant referen...

Oct 5 2007  
  Bluetooth discovery time with multiple inquirers
Peterson B., Baldwin R., Raines R.  System sciences (Proceedings of the 39th Annual Hawaii International Conference on System Sciences,Jan 4-7, 2006) 232.12006.  Type: Proceedings

For personal area networks containing small but numerous devices to become more widely deployed, there must be reliable automatic network discovery and formation mechanisms (often the devices work in a totally autonomous manner, withou...

Jun 14 2007  
  Advanced routing worm and its security challenges
Zou C., Towsley D., Gong W., Cai S. SIMULATION 82(1): 75-85, 2006.  Type: Article

In today’s Internet security context, most attacks are achieved by software worms replicating from host to host, and taking advantage of security holes in operating system software. Since most such hosts need to be connec...

Jan 8 2007  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy