Sciweavers

1564 search results - page 285 / 313
» Communication models for throughput optimization in mesh net...
Sort
View
GLOBECOM
2006
IEEE
15 years 8 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
GLOBECOM
2008
IEEE
15 years 8 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 7 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
ESA
2006
Springer
140views Algorithms» more  ESA 2006»
15 years 5 months ago
Latency Constrained Aggregation in Sensor Networks
A sensor network consists of sensing devices which may exchange data through wireless communication. A particular feature of sensor networks is that they are highly energy constrai...
Luca Becchetti, Peter Korteweg, Alberto Marchetti-...
GLOBECOM
2008
IEEE
15 years 8 months ago
Pricing of Differentiated-QoS Services WiMAX Networks
Abstract—WiMAX/IEEE 802.16 system is a very open Broadband Wireless Access (BWA) technology with different possible services. Pricing of WiMAX is an important topic with differen...
Aymen Belghith, Loutfi Nuaymi, Patrick Maill&eacut...