Sciweavers

2503 search results - page 214 / 501
» Building Computer Network Attacks
Sort
View
PERCOM
2007
ACM
16 years 1 months ago
The SkyLoc Floor Localization System
When a mobile user dials 911, a key to arriving to the emergency scene promptly is knowing the location of the mobile user. This paper presents SkyLoc, a GSM fingerprinting-based ...
Alex Varshavsky, Anthony LaMarca, Jeffrey Hightowe...
PODC
2003
ACM
15 years 7 months ago
Adapting to a reliable network path
We consider the model of unreliable network links, where at each time unit a link might be either up or down. We consider two related problems. The first, establishing end to end...
Baruch Awerbuch, Yishay Mansour
AIMS
2007
Springer
15 years 8 months ago
RAQNet: A Topology-Aware Overlay Network
Peer-to-peer overlay networks provide a useful infrastructure for building distributed applications. These networks provide efficient and fault-tolerant routing and object locating...
Seyed Iman Mirrezaei, Javad Shahparian, Mohammad G...
APNOMS
2006
Springer
15 years 5 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
EUROPAR
2003
Springer
15 years 7 months ago
The Design of an API for Strict Multithreading in C++
Abstract. This paper deals with the design of an API for building distributed parallel applications in C++ which embody strict multithreaded computations. The API is enhanced with ...
Wolfgang Blochinger, Wolfgang Küchlin