Sciweavers

523 search results - page 84 / 105
» A simulation model for military deployment
Sort
View
82
Voted
MMM
2007
Springer
127views Multimedia» more  MMM 2007»
15 years 6 months ago
Optimizing the Throughput of Data-Driven Based Streaming in Heterogeneous Overlay Network
Recently, much attention has been paid on data-driven (or swarm-like) based live streaming systems due to its rapid growth in deployment over Internet. In such systems, nodes rando...
Meng Zhang, Chunxiao Chen, Yongqiang Xiong, Qian Z...
VTC
2007
IEEE
115views Communications» more  VTC 2007»
15 years 6 months ago
The DYMO Routing Protocol in VANET Scenarios
—Coupling Vehicular Ad Hoc Networks (VANETs) with wired networks such as the Internet via access points creates a difficult mix of highly mobile nodes and a static infrastructur...
Christoph Sommer, Falko Dressler
101
Voted
CCS
2007
ACM
15 years 6 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
87
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
82
Voted
IPPS
2005
IEEE
15 years 6 months ago
A Mutual Anonymous Peer-to-Peer Protocol Design
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sharing pattern and powerful query search scheme. However, decentralized P2P archi...
Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lion...