Sciweavers

7544 search results - page 152 / 1509
» Network Forensics Analysis
Sort
View
146
Voted
FM
2009
Springer
163views Formal Methods» more  FM 2009»
15 years 8 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
126
Voted
ICCAD
2000
IEEE
132views Hardware» more  ICCAD 2000»
15 years 8 months ago
Frequency Domain Analysis of Switching Noise on Power Supply Network
In this paper, we propose an approach for the analysis of power supply noise in the frequency domain for power/ground (P/G) networks of tree topologies. We model the P/G network a...
Shiyou Zhao, Kaushik Roy, Cheng-Kok Koh
139
Voted
GROUP
2007
ACM
15 years 7 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
132
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
169
Voted
BROADNETS
2004
IEEE
15 years 7 months ago
Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks
This paper presents the detailed design and performance analysis of MACA-P, a RTS/CTS based MAC protocol, that enables simultaneous transmissions in wireless mesh networks. The IE...
Arup Acharya, Archan Misra, Sorav Bansal