Sciweavers

7544 search results - page 229 / 1509
» Network Forensics Analysis
Sort
View
174
Voted
WINET
2010
130views more  WINET 2010»
15 years 3 months ago
Performance analysis of the cumulative ARQ in IEEE 802.16 networks
In this paper, we study the performance of the cumulative Automatic Repeat reQuest (ARQ) in IEEE 802.16 networks. An analytical model is developed to investigate some important per...
Fen Hou, James She, Pin-Han Ho, Xuemin (Sherman) S...
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 2 months ago
Performance Analysis of QoS in PMP Mode WiMax Networks
IEEE 802.16 standard supports two different topologies: point to multipoint (PMP) and Mesh. In this paper, a QoS mechanism for point to multipoint of IEEE 802.16 and BS scheduler ...
Maninder Singh Kamboj, Harwinder Singh
162
Voted
CHI
2008
ACM
16 years 5 months ago
The network in the garden: an empirical analysis of social media in rural life
History repeatedly demonstrates that rural communities have unique technological needs. Yet, we know little about how rural communities use modern technologies, so we lack knowled...
Eric Gilbert, Karrie Karahalios, Christian Sandvig
156
Voted
JCNS
2002
99views more  JCNS 2002»
15 years 5 months ago
Coarse-Grained Reduction and Analysis of a Network Model of Cortical Response: I. Drifting Grating Stimuli
We present a reduction of a large-scale network model of visual cortex developed by McLaughlin, Shapley, Shelley, and Wielaard. The reduction is from many integrate-and-fire neuron...
Michael Shelley, David McLaughlin
ACSAC
2010
IEEE
14 years 9 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo