Sciweavers

2147 search results - page 300 / 430
» Natural Phenomena Simulation
Sort
View
INFOCOM
2005
IEEE
15 years 11 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
IPCCC
2005
IEEE
15 years 11 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
IPPS
2005
IEEE
15 years 11 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
114
Voted
ISCAS
2005
IEEE
144views Hardware» more  ISCAS 2005»
15 years 11 months ago
A method for online secondary path modeling in active noise control systems
— This paper proposes a new method for online secondary path modeling in active noise control (ANC) systems. The proposed method is a modified version of the basic method, propo...
Muhammad Tahir Akhtar, Masahide Abe, Masayuki Kawa...
MOBIQUITOUS
2005
IEEE
15 years 11 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy