Sciweavers

5234 search results - page 741 / 1047
» Simulation of Computer Network Attacks
Sort
View
WCNC
2010
IEEE
15 years 8 months ago
A Comparison between Stand-Alone and Distributed Architectures for Spectrum Hole Detection
Abstract—In this paper two different cognitive radio architectures, i.e. stand-alone and distributed, are proposed for spectrum sensing purposes. In particular, both architecture...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...
145
Voted
WCNC
2010
IEEE
15 years 8 months ago
Modeling IEEE 802.11 DCF System Dynamics
—Experiments show that IEEE 802.11 DCF system exhibits unstable behavior in the congestion onset load range where the system starts to become saturated. This phenomenon is not we...
Zhenzhen Cao, Ren Ping Liu, Xun Yang, Yang Xiao
AINA
2004
IEEE
15 years 8 months ago
A Mathematical Model for Analyzing the Proxy Bidding Method for Mobile Agent-Based Auction Services
This paper presents an auction system based on mobile agents. By using a proxy server, a user can generate a mobile auction agent by giving the bidding information, including the ...
Jie Zhang, Henry C. B. Chan
AINA
2006
IEEE
15 years 8 months ago
Towards an Unified Experimentation Framework for Protocol Engineering
The design and development process of complex systems require an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the func...
Laurent Dairaine, Ernesto Exposito, Herve Thalmens...
139
Voted
BROADNETS
2004
IEEE
15 years 8 months ago
Benefits of Link Protection at Connection Granularity
This paper develops a connection establishment framework for protecting connections against single-link failures using link protection at the granularity of a connection, referred...
Karthikeyan Sathyamurthy, Srinivasan Ramasubramani...