Sciweavers

1639 search results - page 223 / 328
» Degree-constrained network flows
Sort
View
ICNS
2006
IEEE
15 years 6 months ago
TCP Selective Negative Acknowledgment over IEEE 802.11 Wireless Networks
This paper investigates the performance of the TCP transport protocol over IEEE 802.11 wireless networks. A wireless link is generally characterized by high transmission errors an...
Rung-Shiang Cheng, Hui-Tang Lin
ICDCS
1997
IEEE
15 years 5 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava
ESORICS
2006
Springer
15 years 4 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
CIA
2008
Springer
15 years 2 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
110
Voted
CIKM
2008
Springer
15 years 2 months ago
A measure for cluster cohesion in semantic overlay networks
Semantic overlay networks cluster peers that are semantically, thematically or socially close into groups by means of a rewiring procedure that is periodically executed by each pe...
Paraskevi Raftopoulou, Euripides G. M. Petrakis