Sciweavers

537 search results - page 60 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
77
Voted
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 5 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
81
Voted
CN
2002
92views more  CN 2002»
14 years 10 months ago
TCP-friendly traffic conditioning in DiffServ networks: a memory-based approach
Recently, there has been a considerable research interest in designing intelligent markers, tailored for TCP traffic. Markers, one of the building blocks of a traffic conditioner ...
K. R. Renjish Kumar, Akkihebbal L. Ananda, Lillyku...
TSP
2010
14 years 5 months ago
Beamforming and rate allocation in MISO cognitive radio networks
We consider decentralized multiantenna cognitive radio networks where the secondary (cognitive) users are granted simultaneous spectrum access along with the license-holding (prima...
Ali Tajer, Narayan Prasad, Xiaodong Wang
112
Voted
MOBIHOC
2007
ACM
15 years 10 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
83
Voted
CCS
2008
ACM
15 years 28 days ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen