Sciweavers

1077 search results - page 153 / 216
» Optimal Flooding Protocol for Routing in Ad-Hoc Networks
Sort
View
ISSTA
2000
ACM
15 years 2 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 4 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
WMASH
2004
ACM
15 years 3 months ago
SOWER: self-organizing wireless network for messaging
Short Message Service (SMS) has become extremely popular in many countries, and represents a multibillion dollars market. Yet many consumers consider that the price cellular netwo...
Márk Félegyházi, Srdjan Capku...
WSNA
2003
ACM
15 years 3 months ago
The coverage problem in a wireless sensor network
One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this pr...
Chi-Fu Huang, Yu-Chee Tseng
PERCOM
2007
ACM
15 years 9 months ago
Energy Efficient Routing in Nomadic Networks
We present an evaluation of a novel energy-efficient routing protocol for mobile ad-hoc networks. We combine two techniques for optimizing energy levels with a well-known routing ...
Mads Darø Kristensen, Niels Olof Bouvin