Sciweavers

149 search results - page 1 / 30
» Design of Network Topology in an Adversarial Environment
Sort
View
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
CCS
2007
ACM
13 years 10 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru
INFOCOM
2007
IEEE
13 years 10 months ago
Resilient Network Coding in the Presence of Byzantine Adversaries
Abstract— Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a mali...
Sidharth Jaggi, Michael Langberg, Sachin Katti, Tr...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
ISCC
2008
IEEE
254views Communications» more  ISCC 2008»
13 years 11 months ago
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
Rafael De T. Valle, Diego G. Passos, Célio ...