Sciweavers

16 search results - page 1 / 4
» The topology of covert conflict
Sort
View
CORR
2006
Springer
110views Education» more  CORR 2006»
13 years 4 months ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja
TCS
1998
13 years 4 months ago
Conflict-Free Channel Set Assignment for an Optical Cluster Interconnection Network Based on Rotator Digraphs
Recently a class of scalable multi-star optical networks is proposed in [2]. In this class of networks nodes are grouped into clusters. Each cluster employs a separate pair of bro...
Peng-Jun Wan
ICRA
2003
IEEE
133views Robotics» more  ICRA 2003»
13 years 9 months ago
Conflict-free routing of AGVs on the mesh topology based on a discrete-time model
: Automated Guided Vehicles (or AGVs for short) have become an important option in material handling. In many applications, such as container terminals, the service area is often a...
Jianyang Zeng, Wen-Jing Hsu
IM
2007
13 years 6 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
ICCCN
1998
IEEE
13 years 8 months ago
A Parallel-Tree Switch Architecture for ATM Networks
In this paper we present a novel ATM switch called ParallelTree Banyan Switch Fabric (PTBSF) that consists of parallel Banyans arranged in a tree topology. Packets enter at the to...
Mayez A. Al-Mouhamed, Habib Youssef, Wasif Hasan