Sciweavers

2200 search results - page 180 / 440
» Hop Integrity in Computer Networks
Sort
View
136
Voted
IADIS
2004
15 years 5 months ago
A distributed monitoring system with global network and Web technology
A distributed monitoring system has been developed, which is organized with network cameras, an integrated web/mail server, web-based clients including high-performance cellular p...
Yoshiro Imai, Daisuke Yamane, Osamu Sadayuki
107
Voted
ISCC
2005
IEEE
15 years 9 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
159
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 7 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
122
Voted
TOSN
2011
116views more  TOSN 2011»
14 years 10 months ago
A model framework for greedy routing in a sensor network with a stochastic power scheme
A stochastic model is formulated and analyzed to study the advancements of messages under greedy routing in a sensor network with a power-saving scheme. The aim of this model is g...
Holger Paul Keeler, Peter G. Taylor
125
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Network localization in partially localizable networks
— Knowing the positions of the nodes in a network is essential to many next generation pervasive and sensor network functionalities. Although many network localization systems ha...
David Kiyoshi Goldenberg, Arvind Krishnamurthy, W....