Sciweavers

638 search results - page 107 / 128
» Robust Topology Representing Networks
Sort
View
71
Voted
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
SERSCISA
2009
Springer
15 years 4 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
CORR
2004
Springer
127views Education» more  CORR 2004»
14 years 9 months ago
Monitoring, Analyzing, and Controlling Internet-scale Systems with ACME
Analyzing and controlling large distributed services under a wide range of conditions is difficult. Yet these capabilities are essential to a number of important development and o...
David L. Oppenheimer, Vitaliy Vatkovskiy, Hakim We...
SMA
2003
ACM
169views Solid Modeling» more  SMA 2003»
15 years 2 months ago
Surface reconstruction of freeform objects based on multiresolution volumetric method
3D scanners developed over the past several decades have facilitated the reconstruction of complicated engineering parts. Typically the boundary representation of a part is recons...
Sergei Azernikov, Alex Miropolsky, Anath Fischer
VRIPHYS
2010
14 years 4 months ago
Optimization-based Fluid Simulation on Unstructured Meshes
We present a novel approach to fluid simulation, allowing us to take into account the surface energy in a precise manner. This new approach combines a novel, topology-adaptive app...
Marek Krzysztof Misztal, Robert Bridson, Kenny Erl...