Sciweavers

247 search results - page 20 / 50
» Performance analysis of epidemic routing under contention
Sort
View
PE
2006
Springer
114views Optimization» more  PE 2006»
14 years 9 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
NOMS
2008
IEEE
15 years 3 months ago
Self-tuning network support for MANETs
Abstract—Rapid and unpredictable topology changes and resource constraints make delivering packets in a MANET (Mobile Ad hoc Network) a challenging task. Routing information has ...
Yangcheng Huang, Saleem N. Bhatti, Søren-Ak...
ENTCS
2006
173views more  ENTCS 2006»
14 years 9 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 3 months ago
Ad-hoc Path: an Alternative to Backbone For Wireless Mesh Networks
Abstract –The access link contention can severely constrain the endto-end throughput of the path between a source and destination mobile node connected through the backbone of th...
Amir Esmailpour, Muhammad Jaseemuddin, Nidal Nasse...
SIGMETRICS
2005
ACM
197views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
On the performance characteristics of WLANs: revisited
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today’s Internet access technology. Despite its crucial role in affecting end-to-end performan...
Sunwoong Choi, Kihong Park, Chong-kwon Kim