Sciweavers

2503 search results - page 182 / 501
» Building Computer Network Attacks
Sort
View
120
Voted
ACSC
2004
IEEE
15 years 5 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
UM
2005
Springer
15 years 7 months ago
Modeling Individual and Collaborative Problem Solving in Medical Problem-Based Learning
Abstract. Since problem solving in group problem-based learning is a collaborative process, modeling individuals and the group is necessary if we wish to develop an intelligent tut...
Siriwan Suebnukarn, Peter Haddawy
PAM
2007
Springer
15 years 8 months ago
Impact of Alias Resolution on Traceroute -Based Sample Network Topologies
Most Internet measurement studies utilize traceroute-collected path traces to build Internet maps. In this paper, we measure the impact of alias resolution problem on Internet topo...
Mehmet Hadi Gunes, Nicolas Sanchis Nielsen, Kamil ...
AINA
2008
IEEE
15 years 3 months ago
Disaster Communication Network by Combination of Different Wireless LANs
So far we have developed a disaster information network which is very effective and robust using wireless network. In this paper, we introduce a mobile network for disaster commun...
Kazuo Takahata, Shinya Takada, Yoshitaka Shibata
SIGCOMM
2010
ACM
15 years 2 months ago
Towards software-friendly networks
There has usually been a clean separation between networks and the applications that use them. Applications send packets over a simple socket API; the network delivers them. Howev...
Kok-Kiong Yap, Te-Yuan Huang, Ben Dodson, Monica S...