Sciweavers

4714 search results - page 232 / 943
» Cognitive Packet Networks
Sort
View
ICOIN
2005
Springer
15 years 10 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
WINET
2008
94views more  WINET 2008»
15 years 4 months ago
Transmission costs, selfish nodes, and protocol design
We study how selfish nodes react to transmission costs in wireless networks. Intuitively, it seems that transmission costs should have a stabilizing effect as (rational) nodes will...
Peter Marbach

Publication
124views
15 years 2 months ago
Peeling the 802.11 Onion: Separating Congestion from Physical PER
An ability to accurately classify observed packet errors according to their root cause: physical layer or MAC layer contention, in 802.11 networks, opens up many opportunities for ...
Malik Ahmad Yar Khan, Darryl Veitch
130
Voted
MOBIHOC
2006
ACM
16 years 4 months ago
Throughput and delay optimization in interference-limited multihop networks
The performance of a multihop wireless network is typically affected by the interference caused by transmissions in the same network. In a statistical fading environment, the inte...
Ahmed Bader, Eylem Ekici
ACNS
2009
Springer
152views Cryptology» more  ACNS 2009»
15 years 11 months ago
Homomorphic MACs: MAC-Based Integrity for Network Coding
Abstract. Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be c...
Shweta Agrawal, Dan Boneh