Sciweavers

1215 search results - page 211 / 243
» On modeling, analysis, and optimization of packet aggregatio...
Sort
View
MSWIM
2009
ACM
15 years 4 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
TRIDENTCOM
2006
IEEE
15 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 4 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
QEST
2006
IEEE
15 years 3 months ago
Strategy Improvement for Concurrent Reachability Games
A concurrent reachability game is a two-player game played on a graph: at each state, the players simultaneously and independently select moves; the two moves determine jointly a ...
Krishnendu Chatterjee, Luca de Alfaro, Thomas A. H...
95
Voted
TWC
2008
142views more  TWC 2008»
14 years 9 months ago
Cooperative Diversity in Interference Limited Wireless Networks
Using relays in wireless networks can potentially lead to significant capacity increases. However, within an asynchronous multi-user communication setting, relaying might cause mor...
Sam Vakil, Ben Liang