Sciweavers

22 search results - page 4 / 5
» fgcn 2007
Sort
View
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 7 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
FGCN
2007
IEEE
109views Communications» more  FGCN 2007»
13 years 11 months ago
Flow Balancing Hardware for Parallel TCP Streams on Long Fat Pipe Network
Parallel TCP streams are used for data transfer between clusters in today's high performance applications. When parallel TCP streams are used on LFN, part of streams fail to ...
Yutaka Sugawara, Mary Inaba, Kei Hiraki
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
13 years 11 months ago
Consistency Issue on Live Systems Forensics
Volatile data, being vital to digital investigation, have become part of the standard items targeted in the course of live response to a computer system. In traditional computer f...
Frank Y. W. Law, K. P. Chow, Michael Y. K. Kwan, P...
FGCN
2007
IEEE
113views Communications» more  FGCN 2007»
13 years 11 months ago
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme
To keep the evidence that a stored hard disk does not modify its content, the intuitive scheme is to calculate a hash value of the data in all the sectors in a specific order. Ho...
Zoe L. Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu...
FGCN
2007
IEEE
148views Communications» more  FGCN 2007»
13 years 7 months ago
Capacity Increase for Voice over IP Traffic through Packet Aggregation in Wireless Multihop Mesh Networks
Recently, Voice over IP (VoIP) has become an important service for the future internet. However, for ubiquitous wireless VoIP services, greater coverage will be necessary as promi...
Marcel C. Castro, Peter Dely, Jonas Karlsson, Andr...