Sciweavers

TMC
2010
138views more  TMC 2010»
13 years 3 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
CPHYSICS
2008
87views more  CPHYSICS 2008»
13 years 4 months ago
Simulating black hole white dwarf encounters
The existence of supermassive black holes lurking in the centers of galaxies and of stellar binary systems containing a black hole with a few solar masses has been established bey...
Stephan Rosswog, Enrico Ramirez-Ruiz, W. Raphael H...
INFOCOM
2007
IEEE
13 years 11 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...