Sciweavers

7544 search results - page 187 / 1509
» Network Forensics Analysis
Sort
View
112
Voted
ADHOC
2010
123views more  ADHOC 2010»
15 years 3 months ago
An analysis of the lifetime of OLSR networks
The Optimized Link State Routing (OLSR) protocol is a well-known route discovery protocol for ad-hoc networks. OLSR optimizes the flooding of link state information through the ne...
Jan-Maarten Verbree, Maurits de Graaf, Johann Huri...
154
Voted
CORR
2008
Springer
150views Education» more  CORR 2008»
15 years 3 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
TPDS
2008
105views more  TPDS 2008»
15 years 3 months ago
Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks
Consistency maintenance is important to the sharing of dynamic contents in peer-to-peer (P2P) networks. The TTL-based mechanism is a natural choice for maintaining freshness in P2P...
Xueyan Tang, Jianliang Xu, Wang-Chien Lee
149
Voted
CONEXT
2005
ACM
15 years 5 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
175
Voted
CHI
2006
ACM
16 years 4 months ago
Using hybrid networks for the analysis of online software development communities
Social network-based systems usually suffer from two major limitations: they tend to rely on a single data source (e.g. email traffic), and the form of network patterns is often p...
Yevgeniy Eugene Medynskiy, Nicolas Ducheneaut, Aym...