Sciweavers

2672 search results - page 343 / 535
» Testing Self-Similar Networks
Sort
View
ENTCS
2008
390views more  ENTCS 2008»
15 years 2 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
145
Voted
RAID
2010
Springer
15 years 2 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
SUTC
2010
IEEE
15 years 2 months ago
UbiMASS
—Ubiquitous systems build on the vision that great amounts of fixed and mobile microchips and sensors will be integrated in everyday objects. Developing services on basis of sen...
Faruk Bagci, Julian Wolf, Benjamin Satzger, Theo U...
WINET
2010
142views more  WINET 2010»
15 years 2 months ago
Demand-driven publish/subscribe in mobile environments
—We propose a novel Self-Balancing Supply/Demand (SBSD) reactive MANET protocol. Our algorithm dynamically discovers publications matching specified subscriptions by controlled f...
Aris M. Ouksel, Doug Lundquist
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 1 months ago
Starburst SSD: An Efficient Protocol for Selective Dissemination
Abstract--We present Starburst, a routing-based protocol designed to efficiently disseminate data items to small subsets within a sensor network. Starburst constructs a routing hie...
Tahir Azim, Qasim Mansoor, Philip Levis