Sciweavers

1748 search results - page 149 / 350
» Security Models for Heterogeneous Networking
Sort
View
156
Voted
HOTNETS
2010
14 years 10 months ago
The home needs an operating system (and an app store)
Abstract-- We argue that heterogeneity is hindering technological innovation in the home--homes differ in terms of their devices and how those devices are connected and used. To ab...
Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. ...
TMC
2010
155views more  TMC 2010»
15 years 2 months ago
Maximizing the Lifetime of a Barrier of Wireless Sensors
—To make a network last beyond the lifetime of an individual sensor, redundant sensors must be deployed. What sleep-wakeup schedule can then be used for individual sensors so tha...
Santosh Kumar, Ten-Hwang Lai, Marc E. Posner, Pras...
GLOBECOM
2008
IEEE
15 years 10 months ago
Network Formation Games for Distributed Uplink Tree Construction in IEEE 802.16J Networks
— This paper investigates the problem of the formation of an uplink tree structure among the IEEE 802.16j network’s relay stations (RSs) and their serving base station (MR-BS)....
Walid Saad, Zhu Han, Mérouane Debbah, Are H...
NAR
2006
188views more  NAR 2006»
15 years 3 months ago
BiologicalNetworks: visualization and analysis tool for systems biology
Systemslevelinvestigationofgenomicscaleinformation requires the development of truly integrated databases dealing with heterogeneous data, which can be queried for simple properti...
Michael Baitaluk, Mayya Sedova, Animesh Ray, Amarn...
ICOIN
2007
Springer
15 years 10 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo