Sciweavers

5234 search results - page 811 / 1047
» Simulation of Computer Network Attacks
Sort
View
SASN
2004
ACM
15 years 10 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
WICON
2008
15 years 6 months ago
A study of MAC schemes for wireless sensor networks powered by ambient energy harvesting
Energy consumption is a perennial issue in the design of wireless sensor networks which typically rely on portable sources like batteries for power. Recent advances in ambient ene...
Zhi Ang Eu, Winston Khoon Guan Seah, Hwee Pink Tan
BMCBI
2006
129views more  BMCBI 2006»
15 years 4 months ago
Functional clustering of yeast proteins from the protein-protein interaction network
Background: The abundant data available for protein interaction networks have not yet been fully understood. New types of analyses are needed to reveal organizational principles o...
Taner Z. Sen, Andrzej Kloczkowski, Robert L. Jerni...
INFOCOM
2012
IEEE
13 years 7 months ago
CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks
—A cardinal prerequisite for the system design of a sensor network, is to understand the geometric environment where sensor nodes are deployed. The global topology of a largescal...
Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, C...

Publication
255views
17 years 3 months ago
Buffer Management and Rate Guarantees for TCP/IP over Satellite-ATM Networks
Future broadband satellite networks will support a variety of service types. Many such systems are being designed with ATM or ATM like technology. A majority of Internet applicatio...
Rohit Goyal, Raj Jain, Mukul Goyal, Sonia Fahmy, B...