Sciweavers

71 search results - page 9 / 15
» Epidemic thresholds in real networks
Sort
View
75
Voted
CCR
2002
112views more  CCR 2002»
14 years 9 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
RAID
2007
Springer
15 years 3 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
WINET
2010
179views more  WINET 2010»
14 years 8 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ISNN
2010
Springer
14 years 8 months ago
Particle Swarm Optimization Based Learning Method for Process Neural Networks
Abstract. This paper proposes a new learning method for process neural networks (PNNs) based on the Gaussian mixture functions and particle swarm optimization (PSO), called PSO-LM....
Kun Liu, Ying Tan, Xingui He
MSN
2007
Springer
125views Sensor Networks» more  MSN 2007»
15 years 3 months ago
Ensuring Area Coverage in Hybrid Wireless Sensor Networks
Success of Wireless Sensor Networks largely depends whether the deployed network can provide desired coverage with acceptable network lifetime. This paper proposes a distributed pr...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha