Sciweavers

2200 search results - page 20 / 440
» Hop Integrity in Computer Networks
Sort
View
NSDI
2008
15 years 4 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
WISEC
2009
ACM
15 years 8 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
ISPA
2004
Springer
15 years 7 months ago
An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks
Abstract. In mobile ad hoc networks (MANETs), networks can be partitioned into clusters. Clustering algorithms are localized algorithms that have the property of creating an upper ...
Wei Lou, Jie Wu
SRDS
2008
IEEE
15 years 8 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
WCNC
2010
IEEE
15 years 5 months ago
Optimality of Diagonalization of Multicarrier Multi-Hop Linear Non-Regenerative MIMO Relays
Abstract—In this paper, a multicarrier multi-hop multipleinput multiple-output (MIMO) relay system is investigated. A linear non-regenerative strategy is applied at each relay no...
Yue Rong, Yingbo Hua