Sciweavers

CORR
2011
Springer
536views Education» more  CORR 2011»
12 years 10 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
TIFS
2011
375views Education» more  TIFS 2011»
12 years 10 months ago
Towards Situational Awareness of Large-Scale Botnet Probing Events
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
JCDL
2011
ACM
374views Education» more  JCDL 2011»
12 years 6 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
CORR
2011
Springer
362views Education» more  CORR 2011»
12 years 10 months ago
On joint triangulations of two sets of points in the plane
Ajit A. Diwan, Subir Kumar Ghosh, Partha P. Goswam...
Education
Top of PageReset Settings