Sciweavers

8080 search results - page 405 / 1616
» From Computer Networks to Agent Networks
Sort
View
CONEXT
2007
ACM
15 years 9 months ago
Identifying dynamic IP address blocks serendipitously through background scanning traffic
Today's Internet contains a large portion of "dynamic" IP addresses, which are assigned to clients upon request. A significant amount of malicious activities have b...
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang
CONEXT
2005
ACM
15 years 7 months ago
TIE breaking: tunable interdomain egress selection
— The separation of intradomain and interdomain routing has been a key feature of the Internet’s routing architecture from the early days of the ARPAnet. However, the appropria...
Renata Teixeira, Timothy G. Griffin, Mauricio G. C...
WONS
2012
IEEE
14 years 18 days ago
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
—The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IPbased applications for low-power wireless networks like sensor net...
Marcel Bosling, Torsten Redmann, Jean Tekam, Elias...
ATAL
2011
Springer
14 years 5 months ago
Conviviality measures
Conviviality has been introduced as a social science concept for multiagent systems to highlight soft qualitative requirements like user friendliness of systems. In this paper we ...
Patrice Caire, Baptiste Alcalde, Leendert van der ...
WISEC
2009
ACM
15 years 12 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz