Sciweavers

12131 search results - page 2412 / 2427
» Introduction to Modeling and Simulation
Sort
View
TON
2008
108views more  TON 2008»
14 years 9 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
CORR
2010
Springer
58views Education» more  CORR 2010»
14 years 8 months ago
Liquidity in Credit Networks: A Little Trust Goes a Long Way
Credit networks represent a way of modeling trust between entities in a network. Nodes in the network print their own currency and trust each other for a certain amount of each ot...
Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian...
DSP
2008
14 years 8 months ago
On statistical approaches to target silhouette classification in difficult conditions
In this paper we present a methodical evaluation of the performance of a new and two traditional approaches to automatic target recognition (ATR) based on silhouette representatio...
Conrad Sanderson, Danny Gibbins, Stephen Searle
GIS
2010
ACM
14 years 8 months ago
Decentralized querying of topological relations between regions without using localization
This paper proposes an efficient, decentralized algorithm for determining the topological relationship between two regions monitored by a geosensor network. Many centralized algo...
Matt Duckham, Myeong Hun Jeong, Sanjiang Li, Joche...
INFOCOM
2010
IEEE
14 years 8 months ago
Enhancing Wireless TCP: A Serialized-Timer Approach
— In wireless networks, TCP performs unsatisfactorily since packet reordering and random losses may be falsely interpreted as congestive losses. This causes TCP to trigger fast r...
Chengdi Lai, Ka-Cheong Leung, Victor O. K. Li
« Prev « First page 2412 / 2427 Last » Next »