Sciweavers

7329 search results - page 405 / 1466
» Network Extractor Protocols
Sort
View
101
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
LA-MAC: A Load Adaptive MAC Protocol for MANETs
—The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency u...
Weihong Hu, Xiaolong Li, Homayoun Yousefi'zadeh
ISPEC
2007
Springer
15 years 11 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
CSFW
2005
IEEE
15 years 10 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
121
Voted
ICPADS
2005
IEEE
15 years 10 months ago
Group Communication Protocol for Autonomic Computing
: We discuss a group protocol which supports applications with group communication service when QoS supported by networks or required by applications is changed. An autonomic group...
Tomoya Enokido, Makoto Takizawa
137
Voted
WAC
2005
Springer
118views Communications» more  WAC 2005»
15 years 10 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin