Sciweavers

242 search results - page 7 / 49
» Deterministic small-world communication networks
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 6 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
15 years 6 months ago
Deterministic service on IEEE 802.11-like networks
Wireless IEEE 802.11 networks are typically deployed as a convenient and flexible way to access wired backbones. However, due to the inherently shared nature and physical propert...
Mario Baldi, Marco Papa Manzillo
CONEXT
2007
ACM
15 years 3 months ago
The diameter of opportunistic mobile networks
Portable devices have more data storage and increasing communication capabilities everyday. In addition to classic infrastructure based communication, these devices can exploit hu...
Augustin Chaintreau, Abderrahmen Mtibaa, Laurent M...
SIGCOMM
2000
ACM
15 years 4 months ago
Measuring link bandwidths using a deterministic model of packet delay
We describe a deterministic model of packet delay and use it to derive both the packet pair [2] property of FIFO-queueing networks and a new technique (packet tailgating) for acti...
Kevin Lai, Mary Baker
TMC
2010
104views more  TMC 2010»
14 years 10 months ago
On Nodal Encounter Patterns in Wireless LAN Traces
—In this paper we analyze multiple wireless LAN (WLAN) traces from university and corporate campuses. In particular, we consider an important event between mobile nodes in wirele...
Wei-jen Hsu, Ahmed Helmy