Sciweavers

7941 search results - page 191 / 1589
» Network Analysis of Repositories
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
BROADNETS
2004
IEEE
15 years 8 months ago
Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks
This paper presents the detailed design and performance analysis of MACA-P, a RTS/CTS based MAC protocol, that enables simultaneous transmissions in wireless mesh networks. The IE...
Arup Acharya, Archan Misra, Sorav Bansal
152
Voted
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 6 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
CONCURRENCY
2010
104views more  CONCURRENCY 2010»
15 years 4 months ago
Performance analysis of an experimental wireless relay sensor network
Communication through relay channels in wireless sensor networks can create diversity and consequently improve robustness of data transmission for ubiquitous computing and network...
Gu-Chun Zhang, Xiao-Hong Peng, Xuan-Ye Gu
TON
2008
149views more  TON 2008»
15 years 4 months ago
Building heterogeneous peer-to-peer networks: protocol and analysis
In this paper, we propose a simple protocol for building heterogeneous unstructured peer-to-peer (P2P) networks. The protocol consists of two parts--the joining process and the reb...
Kin Wah Kwong, Danny H. K. Tsang