Sciweavers

5234 search results - page 803 / 1047
» Simulation of Computer Network Attacks
Sort
View
LCN
2006
IEEE
15 years 10 months ago
Efficient Algorithms for Secure Multicast key Management
Group Multicast is becoming a prevalent issue in Network applications such as teleconferencing, payper-view, and information services. In order to secure group communications by p...
Elham Khabiri, Saïd Bettayeb
PEWASUN
2005
ACM
15 years 10 months ago
Weak signal detection performance of selective rake receivers in fading channels
We derive the optimum and suboptimum selective rake receivers (SRRs) for fading environment exhibiting impulsive nature. Simulation results confirm that, when the noise is impuls...
Jinsoo Bae, Sang Won Choi, So Ryoung Park, Jongho ...
PEWASUN
2005
ACM
15 years 10 months ago
Investigating unfairness scenarios in MANET using 802.11b
An experimental study of MANET using 802.11b has shown that there exist several configurations where this standard does not guarantee fairness for the channel access. In this pap...
Leïla Kloul, Fabrice Valois
SIGMETRICS
2005
ACM
119views Hardware» more  SIGMETRICS 2005»
15 years 10 months ago
Characterizing the two-tier gnutella topology
Characterizing the properties of peer-to-peer (P2P) overlay topologies in file-sharing applications is essential for understanding their impact on the network, identifying their ...
Daniel Stutzbach, Reza Rejaie
ICN
2005
Springer
15 years 10 months ago
Maximizing System Value Among Interested Packets While Satisfying Time and Energy Constraints
: Data filtering is an important approach to reduce energy consumption. Following this idea, Interest is used as a constraint to filter uninterested data in sensor networks. Within...
Lei Shu, Sungyoung Lee, Xiaoling Wu, Jie Yang