Sciweavers

167 search results - page 2 / 34
» A Comparative Analysis of Specific Spatial Network Topologic...
Sort
View
CCS
2007
ACM
13 years 11 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
ANSS
2004
IEEE
13 years 8 months ago
A Spatial Analysis of Mobility Models: Application to Wireless Ad Hoc Network Simulation
We quantatively analyze the differences between a realistic mobility model, TRANSIMS, and several synthetic mobility models. New synthetic models were created by modifying the sta...
D. Charles Engelhart, Anand Sivasubramaniam, Chris...
DATE
2006
IEEE
100views Hardware» more  DATE 2006»
13 years 11 months ago
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh
NoC architectures can be adopted to support general communications among multiple IPs over multi-processor Systems on Chip (SoCs). In this work we illustrate the modeling and simu...
Luciano Bononi, Nicola Concer
MOBIHOC
2006
ACM
14 years 4 months ago
Topology control meets SINR: : the scheduling complexity of arbitrary topologies
To date, topology control in wireless ad hoc and sensor networks--the study of how to compute from the given communication network a subgraph with certain beneficial properties--h...
Thomas Moscibroda, Roger Wattenhofer, Aaron Zollin...
INFOCOM
2002
IEEE
13 years 9 months ago
Inference and Labeling of Metric-Induced Network Topologies
—The development and deployment of distributed network-aware applications and services require the ability to compile and maintain a model of the underlying network resources wit...
Azer Bestavros, John W. Byers, Khaled Harfoush