Sciweavers

642 search results - page 99 / 129
» Detecting Spoofed Packets
Sort
View
SASN
2006
ACM
15 years 10 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
141
Voted
SIGCOMM
2004
ACM
15 years 10 months ago
Locating internet bottlenecks: algorithms, measurements, and implications
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interest to both network operators and researchers. For example, knowing where bottlen...
Ningning Hu, Erran L. Li, Zhuoqing Morley Mao, Pet...
ICNP
2003
IEEE
15 years 9 months ago
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks
Abstract—In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the...
Wei-Peng Chen, Jennifer C. Hou, Lui Sha
ICC
2000
IEEE
376views Communications» more  ICC 2000»
15 years 9 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi
170
Voted
MASCOTS
2004
15 years 6 months ago
An Optimisation Model for a Two-Node Router Network
Architectural designs for routers and networks of routers to support mobile communication are analysed for their end-to-end performance using a simple Markov model. In view of the...
Nalan Gülpinar, Peter G. Harrison, Berç...