Sciweavers

682 search results - page 110 / 137
» Congestion Control in Computer Networks: Issues and Trends
Sort
View
NSPW
2006
ACM
15 years 8 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
CCS
2004
ACM
15 years 7 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
ADHOCNETS
2010
Springer
14 years 12 months ago
Balanced Itinerary Planning for Multiple Mobile Agents in Wireless Sensor Networks
In this paper, we consider the use of multiple mobile software agents to perform different tasks in wireless sensor networks (WSNs). To this regard, determining the number of mobil...
Min Chen, Wei Cai, Sergio González-Valenzue...
ACSC
2007
IEEE
15 years 8 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
ICDCSW
2005
IEEE
15 years 7 months ago
An Extended Directional MAC for Location Information Staleness in Ad Hoc Networks
Recently, several directional MAC protocols using smart antennas or directional antennas have been proposed for wireless ad hoc networks including our proposed MAC protocol called...
Masanori Takata, Masaki Bandai, Takashi Watanabe