Sciweavers

7329 search results - page 190 / 1466
» Network Extractor Protocols
Sort
View
151
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks
— Load factor based congestion control schemes have shown to enhance network performance, in terms of utilization, packet loss and delay. In these schemes, using more accurate re...
Ihsan A. Qazi, Taieb Znati
ICC
2007
IEEE
115views Communications» more  ICC 2007»
15 years 10 months ago
Distributed Minimum-Cost Clustering Protocol for UnderWater Sensor Networks (UWSNs)
—In this paper, we study the node clustering problem in UnderWater Sensor Networks (UWSNs). We formulate the problem into a cluster-centric cost-based optimization problem with a...
Pu Wang, Cheng Li, Jun Zheng
171
Voted
WIMOB
2007
IEEE
15 years 9 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
157
Voted
CORR
2004
Springer
142views Education» more  CORR 2004»
15 years 3 months ago
Dynamic Localization Protocols for Mobile Sensor Networks
The ability of a sensor node to determine its physical location within a network (Localization) is of fundamental importance in sensor networks. Interpretating data from sensors i...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
140
Voted
USS
2010
15 years 1 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...