Sciweavers

5234 search results - page 716 / 1047
» Simulation of Computer Network Attacks
Sort
View
INFOCOM
2003
IEEE
15 years 10 months ago
Optimizing Route-Cache Lifetime in Ad Hoc Networks
—On-demand routing reduces the control overhead in mobile ad hoc networks, but it has the major drawback of introducing latency between route-request arrival and the determinatio...
Ben Liang, Zygmunt J. Haas
INFOCOM
2003
IEEE
15 years 10 months ago
Robust Location Detection in Emergency Sensor Networks
— We propose a new framework for providing robust location detection in emergency response systems, based on the theory of identifying codes. The key idea of this approach is to ...
Saikat Ray, Rachanee Ungrangsi, Francesco De Pelle...
171
Voted
ICPP
2002
IEEE
15 years 10 months ago
Reliable MAC Layer Multicast in IEEE 802.11 Wireless Networks
Multicast/broadcast is an important service primitive in networks. The IEEE 802.11 multicast/broadcast protocol is based on the basic access procedure of Carrier Sense Multiple Ac...
Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang La...
132
Voted
ICPPW
2002
IEEE
15 years 10 months ago
Hierarchical Restoration Scheme for Multiple Failures in GMPLS Networks
Abstract—It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures ...
SuKyoung Lee, Chul Kim, David W. Griffith
148
Voted
DASFAA
2009
IEEE
122views Database» more  DASFAA 2009»
15 years 9 months ago
Optimization on Data Object Compression and Replication in Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks (WMSNs) have brought unprecedented potentials for applications requiring ubiquitous access to multimedia contents such as still images. However,...
MingJian Tang, Jinli Cao, Xiaohua Jia, Ke-Yan Liu