Sciweavers

5234 search results - page 759 / 1047
» Simulation of Computer Network Attacks
Sort
View
NETWORKING
2011
14 years 7 months ago
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth-equipped mobile devices. Unfortunately, virus write...
Nicholas Valler, B. Aditya Prakash, Hanghang Tong,...
SIGCOMM
2012
ACM
13 years 7 months ago
DeTail: reducing the flow completion time tail in datacenter networks
Web applications have now become so sophisticated that rendering a typical page may require hundreds of intra-datacenter flows. At the same time, web sites must meet strict page ...
David Zats, Tathagata Das, Prashanth Mohan, Dhruba...
PERCOM
2003
ACM
16 years 4 months ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...
MOBIHOC
2006
ACM
16 years 4 months ago
Mobile backbone networks --: construction and maintenance
We study a novel hierarchical wireless networking approach in which some of the nodes are more capable than others. In such networks, the more capable nodes can serve as Mobile Ba...
Anand Srinivas, Gil Zussman, Eytan Modiano
MOBIHOC
2005
ACM
16 years 4 months ago
Localization and routing in sensor networks by local angle information
Location information is very useful in the design of sensor network infrastructures. In this paper, we study the anchor-free 2D localization problem by using local angle measureme...
Jehoshua Bruck, Jie Gao, Anxiao Jiang