Sciweavers

1875 search results - page 126 / 375
» Automatic Network Protocol Analysis
Sort
View
CMG
2007
15 years 4 months ago
An Empirical Evaluation of Communication and Processing Overhead in Service Oriented Architectures
Most modern applications are networked and make heavy use of various communication protocols such as TCP/IP and SOAP over HTTP in case of Web Services. This paper presents the res...
Daniel A. Menascé
SENSYS
2005
ACM
15 years 8 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
SASN
2006
ACM
15 years 9 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 10 months ago
Power Allocation Games in Interference Relay Channels: Existence Analysis of Nash Equilibria
We consider a network composed of two interfering point-to-point links where the two transmitters can exploit one common relay node to improve their individual transmission rate. ...
Elena Veronica Belmega, Samson Lasaulce
MVA
2000
157views Computer Vision» more  MVA 2000»
15 years 4 months ago
Performance Analysis of Gabor Responses in Face Recognition
In this paper, we investigate the behavior of Gabor responses at automatically located facial feature points for face recognition. In our approach, a set of feature points on the ...
Menaka Rajapakse, Yan Guo