Sciweavers

382 search results - page 61 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
TWC
2008
156views more  TWC 2008»
15 years 4 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
ECRTS
1999
IEEE
15 years 9 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns
GLOBECOM
2006
IEEE
15 years 10 months ago
On the Suitability of Applications for GMPLS Networks
— After identifying that current GMPLS specifications only allow for the implementation of a call blocking mode of operation that handles immediate-request calls (not book-ahead...
Malathi Veeraraghavan, Xiuduan Fang, Xuan Zheng
CORR
2010
Springer
105views Education» more  CORR 2010»
14 years 11 months ago
Universal and Robust Distributed Network Codes
Random linear network codes can be designed and implemented in a distributed manner, with low computational complexity. However, these codes are classically implemented [1] over fi...
Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lin...