Sciweavers

433 search results - page 22 / 87
» Networks and our Limited Information Horizon
Sort
View
SECURWARE
2008
IEEE
15 years 4 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
14 years 4 months ago
Effect of network structure on the stability margin of large vehicle formation with distributed control
We study the problem of distributed control of a large network of double-integrator agents to maintain a rigid formation. A few lead vehicles are given information on the desired t...
He Hao, Prabir Barooah, J. J. P. Veerman
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 4 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
ICCAD
1993
IEEE
81views Hardware» more  ICCAD 1993»
15 years 1 months ago
Inverter minimization in multi-level logic networks
In this paper, we look at the problem of inverter minimization in multi-level logic networks. The network is specified in terms of a set of base functions and the inversion opera...
Alok Jain, Randal E. Bryant
ICNP
2006
IEEE
15 years 3 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...