Sciweavers

3296 search results - page 542 / 660
» Gathercast with Active Networks
Sort
View
ICC
2007
IEEE
145views Communications» more  ICC 2007»
15 years 7 months ago
Analytical Model of TCP with Enhanced Recovery Mechanism for Wireless Environments
— In this paper, we extend the analytical model for the TCP steady state throughput as a function of the network utilization factor, round trip time and packet drop rate for unli...
A. Jayananthan, Harsha Sirisena, Vijay Garg
125
Voted
ICCCN
2007
IEEE
15 years 7 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ICON
2007
IEEE
15 years 7 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
IFIP
2007
Springer
15 years 7 months ago
Global Supply Chain Control
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
Heidi C. Dreyer, Ottar Bakås, Erlend Alfnes,...
99
Voted
ACMSE
2006
ACM
15 years 6 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin