Sciweavers

5234 search results - page 797 / 1047
» Simulation of Computer Network Attacks
Sort
View
134
Voted
MOBISYS
2011
ACM
14 years 7 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...
173
Voted
ICDCS
2011
IEEE
14 years 4 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
ICCV
2003
IEEE
16 years 6 months ago
Camera calibration using spheres: A semi-definite programming approach
Vision algorithms utilizing camera networks with a common field of view are becoming increasingly feasible and important. Calibration of such camera networks is a challenging and ...
Motilal Agrawal, Larry S. Davis
PDP
2009
IEEE
15 years 11 months ago
Effects of Job and Task Placement on Parallel Scientific Applications Performance
—this paper studies the influence that task placement may have on the performance of applications, mainly due to the relationship between communication locality and overhead. Thi...
Javier Navaridas, Jose Antonio Pascual, José...
133
Voted
SAC
2009
ACM
15 years 11 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...