Sciweavers

2213 search results - page 340 / 443
» On the Scalability of Centralized Control
Sort
View
CN
2010
109views more  CN 2010»
15 years 1 months ago
A taxonomy of biologically inspired research in computer networking
The natural world is enormous, dynamic, incredibly diverse, and highly complex. Despite the inherent challenges of surviving in such a world, biological organisms evolve, self-org...
Michael Meisel, Vasileios Pappas, Lixia Zhang
CCR
2008
86views more  CCR 2008»
15 years 1 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
CORR
2010
Springer
122views Education» more  CORR 2010»
15 years 1 months ago
Collision Helps - Algebraic Collision Recovery for Wireless Erasure Networks
Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. The recent work on ZigZag decoding departs from this approach by recov...
Ali ParandehGheibi, Jay Kumar Sundararajan, Muriel...
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 1 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2010
Springer
432views Education» more  CORR 2010»
15 years 1 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen