Sciweavers

5234 search results - page 751 / 1047
» Simulation of Computer Network Attacks
Sort
View
LCN
2005
IEEE
15 years 10 months ago
Improving the Data Transmission Throughput over the Home Electrical Wiring
Abstract— Powerline communications (PLC) are receiving special attention since they use an already available and ubiquitous infrastructure. The main standard for PLC home network...
Miguel Elias M. Campista, Luís Henrique Mac...
NOSSDAV
2004
Springer
15 years 10 months ago
Low latency and cheat-proof event ordering for peer-to-peer games
We are developing a distributed architecture for massivelymultiplayer games. In this paper, we focus on designing a low-latency event ordering protocol, called NEO, for this archi...
Chris GauthierDickey, Daniel Zappala, Virginia Mar...
CIA
2008
Springer
15 years 6 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
PST
2008
15 years 6 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
TC
2008
15 years 4 months ago
A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking
As one of the fundamental issues in wireless sensor networks (WSNs), the sensor localization problem has recently received extensive attention. In this work, we investigate this pr...
Liqiang Zhang, Qiang Cheng, Yingge Wang, Sherali Z...