Sciweavers

155 search results - page 30 / 31
» Performance Analysis of the Hierarchical Layer Graph for Wir...
Sort
View
ICNP
2007
IEEE
14 years 22 days ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 6 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
JSAC
2011
219views more  JSAC 2011»
13 years 1 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
WOSP
2005
ACM
13 years 12 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu
QSHINE
2005
IEEE
14 years 3 hour ago
Solving The Multi-Constrained Path Selection Problem By Using Depth First Search
An extended depth-first-search (EDFS) algorithm is proposed to solve the multi-constrained path (MCP) problem in quality-of-service (QoS) routing, which is NP-Complete when the n...
Zhenjiang Li, J. J. Garcia-Luna-Aceves