Sciweavers

4642 search results - page 596 / 929
» Distributed algorithm and reversible network
Sort
View
154
Voted
MSWIM
2006
ACM
15 years 9 months ago
Pattern matching based link quality prediction in wireless mobile ad hoc networks
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
Károly Farkas, Theus Hossmann, Lukas Ruf, B...
205
Voted
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 7 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
NDSS
2009
IEEE
15 years 10 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
120
Voted
LCN
1994
IEEE
15 years 7 months ago
The Packet Starvation Effect in CSMA/CD LANs and a Solution
In this paper we explore the packet starvation effect (PSE) that occurs in Ethernet controllers due to the unfairness of the CSMA/CD algorithm. The PSE causes some packets to expe...
Brian Whetten, Stephen Steinberg, Domenico Ferrari
130
Voted
IWANN
2001
Springer
15 years 8 months ago
Pattern Repulsion Revisited
Marques and Almeida [9] recently proposed a nonlinear data seperation technique based on the maximum entropy principle of Bell and Sejnowsky. The idea behind is a pattern repulsion...
Fabian J. Theis, Christoph Bauer, Carlos Garc&iacu...