Sciweavers

6199 search results - page 1184 / 1240
» Monitoring the
Sort
View
COMCOM
2010
96views more  COMCOM 2010»
14 years 12 months ago
Passive internet measurement: Overview and guidelines based on experiences
Due to its versatility, flexibility and fast development, the modern Internet is far from being well understood in its entirety. A good way to learn more about how the Internet fu...
Wolfgang John, Sven Tafvelin, Tomas Olovsson
CN
2008
84views more  CN 2008»
14 years 12 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
COMCOM
2008
145views more  COMCOM 2008»
14 years 12 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
CORR
2010
Springer
88views Education» more  CORR 2010»
14 years 12 months ago
Kinematic modelling of a 3-axis NC machine tool in linear and circular interpolation
Machining time is a major performance criterion when it comes to high speed machining. CAM software can help in estimating that time for a given strategy. But in practice, CAM pro...
Xavier Pessoles, Yann Landon, Walter Rubio
CORR
2010
Springer
79views Education» more  CORR 2010»
14 years 12 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
« Prev « First page 1184 / 1240 Last » Next »