Sciweavers

2497 search results - page 427 / 500
» Requirements for models of achievable routing
Sort
View
GAMESEC
2010
14 years 11 months ago
ISPs and Ad Networks Against Botnet Ad Fraud
Botnets are a serious threat on the Internet and require huge resources to be thwarted. ISPs are in the best position to fight botnets and there are a number of recently proposed i...
Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim...
PIMRC
2010
IEEE
14 years 11 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
119
Voted
SECON
2010
IEEE
14 years 11 months ago
Disruption-Tolerant Spatial Dissemination
Abstract-- Spatial dissemination is a specific form of information dissemination that enables mobile users to send information to other mobile users who are or will appear at a spe...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 11 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
120
Voted
ICCAD
2009
IEEE
96views Hardware» more  ICCAD 2009»
14 years 11 months ago
PSTA-based branch and bound approach to the silicon speedpath isolation problem
The lack of good "correlation" between pre-silicon simulated delays and measured delays on silicon (silicon data) has spurred efforts on so-called silicon debug. The ide...
Sari Onaissi, Khaled R. Heloue, Farid N. Najm