Sciweavers

463 search results - page 53 / 93
» Discovering communication
Sort
View
84
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
The Information Propagation Speed Upper Bound in Cognitive Radio Networks
Abstract--The information propagation speed (IPS) of a network specifies how fast the information can be transmitted in a network. In this paper, we derive an IPS upper bound in co...
Chuan Han, Yaling Yang
134
Voted
IWCMC
2010
ACM
14 years 10 months ago
High performance modified DSR routing protocol for WLAN mesh networks
This work presents a cross-layer modification to the DSR protocol which discovers high throughput paths on multi-hop wireless mesh networks. The modified DSR incorporates a metric...
Mustafa Ramadhan, Mark Davis
159
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 7 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
INFOCOM
2012
IEEE
13 years 2 months ago
NSDMiner: Automated discovery of Network Service Dependencies
—Enterprise networks today host a wide variety of network services, which often depend on each other to provide and support network-based services and applications. Understanding...
Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia...
TOG
2012
193views Communications» more  TOG 2012»
13 years 2 months ago
Continuous character control with low-dimensional embeddings
Interactive, task-guided character controllers must be agile and responsive to user input, while retaining the flexibility to be readily authored and modified by the designer. C...
Sergey Levine, Jack M. Wang, Alexis Haraux, Zoran ...