Sciweavers

450 search results - page 51 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
SWARM
2010
SPRINGER
283views Optimization» more  SWARM 2010»
14 years 8 months ago
Principles and applications of swarm intelligence for adaptive routing in telecommunications networks
In the past few years there has been a lot of research on the application of swarm intelligence to the problem of adaptive routing in telecommunications networks. A large number of...
Frederick Ducatelle, Gianni A. Di Caro, Luca Maria...
PERCOM
2004
ACM
15 years 9 months ago
A Mobility Gateway for Small-Device Networks
Networks of small devices, such as environmental sensors, introduce a number of new challenges for traditional protocols and approaches. In particular, the extreme resource constr...
Robert C. Chalmers, Kevin C. Almeroth
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 2 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
PAM
2010
Springer
14 years 11 months ago
Influence of the Packet Size on the One-Way Delay in 3G Networks
We currently observe a rising interest in mobile broadband, which users expect to perform in a similar way as its fixed counterpart. On the other hand, the capacity allocation proc...
Patrik Arlos, Markus Fiedler
TMC
2012
13 years 5 days ago
A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access
—Characterizing the performance of ad hoc networks is one of the most intricate open challenges; conventional ideas based on information-theoretic techniques and inequalities hav...
Sunil Srinivasa, Martin Haenggi