Sciweavers

1875 search results - page 148 / 375
» Automatic Network Protocol Analysis
Sort
View
INFOCOM
2005
IEEE
15 years 9 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
103
Voted
IPSN
2003
Springer
15 years 8 months ago
Mobicast: Just-in-Time Multicast for Sensor Networks under Spatiotemporal Constraints
This paper is concerned with coordinated delivery of messages in sensor networks. The notion of multicast is re-examined in light of a new set of requirements that are specific t...
Qingfeng Huang, Chenyang Lu, Gruia-Catalin Roman
JNW
2007
118views more  JNW 2007»
15 years 3 months ago
Collision Prevention Platform for a Dynamic Group of Asynchronous Cooperative Mobile Robots
— This paper presents a fail-safe platform on which cooperative mobile robots rely for their motion. The platform consists of a collision prevention protocol for a dynamic group ...
Rami Yared, Xavier Défago, Julien Iguchi-Ca...
INFOCOM
2003
IEEE
15 years 8 months ago
Static and Dynamic Analysis of the Internet's Susceptibility to Faults and Attacks
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
Seung-Taek Park, Alexy Khrabrov, David M. Pennock,...
TWC
2008
87views more  TWC 2008»
15 years 3 months ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang