Sciweavers

2485 search results - page 176 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
151
Voted
PE
2002
Springer
158views Optimization» more  PE 2002»
15 years 3 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
145
Voted
ICC
2008
IEEE
159views Communications» more  ICC 2008»
15 years 10 months ago
Link Scheduling and Power Control in Wireless Mesh Networks with Directional Antennas
— Directional antennas are very attractive in Wireless Mesh Networks (WMN). We study the problem of link scheduling and power control in a Time-Division Multiple Access (TDMA) WM...
Vishwanath Ramamurthi, Abu Ahmed Reaz, Sudhir S. D...
125
Voted
JSW
2007
115views more  JSW 2007»
15 years 3 months ago
Modeling Network Behaviour By Full-System Simulation
— Due to the network technology advances, an order-of-magnitude jump has been produced in the network bandwidth. This fact has returned to wake up the interest on protocol offloa...
Andrés Ortiz, Julio Ortega, Antonio F. D&ia...
136
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Exploring Simulated Annealing and Graphical Models for Optimization in Cognitive Wireless Networks
In this paper we discuss the design of optimization algorithms for cognitive wireless networks (CWNs). Maximizing the perceived network performance towards applications by selectin...
Elena Meshkova, Janne Riihijärvi, Andreas Ach...
130
Voted
SAC
2010
ACM
15 years 10 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...