Sciweavers

6110 search results - page 151 / 1222
» Graceful Network Operations
Sort
View
197
Voted
WD
2010
14 years 7 months ago
Uplink capacity analysis of OFDMA based cellular networks with reuse-1
Abstract--OFDMA based cellular radio networks aim to operate as close as possible to frequency reuse distance of one, where the whole spectrum would be available in every cell. Mod...
Maciej Mühleisen, Daniel Bültmann, Bernh...
89
Voted
ISDA
2005
IEEE
15 years 6 months ago
IDEAS: Intrusion Detection based on Emotional Ants for Sensors
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including crypto...
Soumya Banerjee, Crina Grosan, Ajith Abraham
FPL
2005
Springer
138views Hardware» more  FPL 2005»
15 years 6 months ago
Snort Offloader: A Reconfigurable Hardware NIDS Filter
Software-based Network Intrusion Detection Systems (NIDS) often fail to keep up with high-speed network links. In this paper an FPGA-based pre-filter is presented that reduces th...
Haoyu Song, Todd S. Sproull, Michael Attig, John W...
116
Voted
ICRA
2005
IEEE
125views Robotics» more  ICRA 2005»
15 years 6 months ago
Bullwhip effect in Integrated Manufacturing and Service Networks
- An Integrated Manufacturing and Service Network (IMSN) is a grouping of companies, working together to offer a bundle of products and product-related services, that deliver value...
Nukala Viswanadham, Vijay Desai, Roshan S. Gaonkar
SAINT
2003
IEEE
15 years 6 months ago
Secure Link State Routing for Mobile Ad Hoc Networks
The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, securit...
Panagiotis Papadimitratos, Zygmunt J. Haas