Sciweavers

5234 search results - page 818 / 1047
» Simulation of Computer Network Attacks
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network
Abstract— In label-switched networks such as MPLS, protection routing involves computing and setting up the backup paths at the same time when the primary paths are routed. It ha...
Faisal Aslam, Saqib Raza, Zartash Afzal Uzmi, Youn...
ADHOCNOW
2006
Springer
15 years 10 months ago
File System Support for Adjustable Resolution Applications in Sensor Networks
Flash memory is often the technology of choice for sensor networks because of its cost-effectiveness and attractive energy properties. In storage-constrained sensor network applica...
Vikram P. Munishwar, Sameer Tilak, Nael B. Abu-Gha...
SENSYS
2005
ACM
15 years 10 months ago
Packet combining in sensor networks
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions o...
Henri Dubois-Ferrière, Deborah Estrin, Mart...
ADHOCNOW
2005
Springer
15 years 10 months ago
MIMOMAN: A MIMO MAC Protocol for Ad Hoc Networks
Multiple-Input Multiple-Output (MIMO) antenna systems present a radical way to improve the performance of wireless communications. Such systems can be utilized in wireless ad hoc n...
Joon-Sang Park, Mario Gerla
ISPA
2005
Springer
15 years 10 months ago
Ethernet as a Lossless Deadlock Free System Area Network
The way conventional Ethernet is used today differs in two aspects from how dedicated system area networks are used. Firstly, dedicated system area networks are lossless and only d...
Sven-Arne Reinemo, Tor Skeie