Sciweavers

6031 search results - page 1192 / 1207
» Communicating Transaction Processes
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 1 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai
CN
2007
168views more  CN 2007»
15 years 1 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
JCIT
2008
129views more  JCIT 2008»
15 years 1 months ago
An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...
E. Baburaj, V. Vasudevan
JNW
2008
83views more  JNW 2008»
15 years 1 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
JSAC
2008
199views more  JSAC 2008»
15 years 1 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
« Prev « First page 1192 / 1207 Last » Next »