Sciweavers

1657 search results - page 184 / 332
» Network flow spanners
Sort
View
ACSAC
2008
IEEE
15 years 7 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Network coding-aware rate control and scheduling in wireless networks
Network coding has been recently applied to wireless networks to increase throughput. It is typically implemented as a thin layer between MAC and IP, transparently to higher layer...
Hulya Seferoglu, Athina Markopoulou, Ulas C. Kozat
131
Voted
GCC
2003
Springer
15 years 6 months ago
Network Behavior Analysis Based on a Computer Network Model
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...
Weili Han, Shuai Dianxun, Yujun Liu
130
Voted
CISS
2007
IEEE
15 years 7 months ago
Bounding A Statistical Measure Of Network Lifetime For Wireless Sensor Networks
—The inherent many-to-one flow of traffic in Wireless Sensor Networks produces a skewed distribution of energy consumption rates leading to the early demise of those sensors that...
Muhammad Usman Ilyas, Hayder Radha
DMSN
2006
ACM
15 years 7 months ago
Network scheduling for data archiving applications in sensor networks
Since data archiving in sensor networks is a communication intensive application, a careful power management of communication is of critical importance for such networks. An examp...
Yong Yao, S. M. Nazrul Alam, Johannes Gehrke, Serg...