Sciweavers

610 search results - page 38 / 122
» Application-level Simulation for Network Security
Sort
View
IFIP
2009
Springer
15 years 2 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith
INFOCOM
2006
IEEE
15 years 3 months ago
A Client-Driven Approach for Channel Management in Wireless LANs
— We propose an efficient client-based approach for channel management (channel assignment and load balancing) in 802.11-based WLANs that lead to better usage of the wireless sp...
Arunesh Mishra, Vladimir Brik, Suman Banerjee, Ara...
CCS
2009
ACM
15 years 4 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
AGENTS
2001
Springer
15 years 2 months ago
Scheduling multi-task multi-agent systems
We present a centralized and a distributed algorithms for scheduling multi-task agents in heterogeneous networks. Our centralized algorithm has an upper bound on the overall compl...
Rong Xie, Daniela Rus, Clifford Stein
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...