Sciweavers

944 search results - page 94 / 189
» A Survey on Counting Networks
Sort
View
CCS
2008
ACM
15 years 1 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
ADHOCNOW
2006
Springer
15 years 5 months ago
A Classification and Performance Comparison of Mobility Models for Ad Hoc Networks
In mobile ad hoc network research, simulation plays an important role in determining the network characteristics and measuring performance. On the other hand, unrealistic simulatio...
Emre Atsan, Öznur Özkasap
MOBIHOC
2000
ACM
15 years 4 months ago
Dynamic quality-of-service for mobile ad hoc networks
In this paper we discuss the dynamic network characteristics of mobile ad hoc networks, and explore problems that arise when attempting to provide QoS support in this environment....
M. Mirhakkak, N. Schult, D. Thomson
NETWORK
2006
177views more  NETWORK 2006»
14 years 12 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
FGCN
2008
IEEE
116views Communications» more  FGCN 2008»
15 years 6 months ago
Routing in Degree-Constrained FSO Mesh Networks
This paper addresses the routing problem in packet switching free-space optical (FSO) mesh networks. FSO mesh networks are emerging as broadband communication networks because of ...
Ziping Hu, Pramode K. Verma, James J. Sluss Jr.