Sciweavers

211 search results - page 26 / 43
» The effect of cooperation at the network protocol level
Sort
View
ICNP
2007
IEEE
15 years 6 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
CMOT
1999
143views more  CMOT 1999»
14 years 11 months ago
Structural Learning: Attraction and Conformity in Task-Oriented Groups
This study extends previous research that showed how informal social sanctions can backfire when members prefer friendship over enforcement of group norms. We use a type of neural...
James A. Kitts, Michael W. Macy, Andreas Flache
SIGMETRICS
2008
ACM
14 years 11 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
ESAS
2004
Springer
15 years 3 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
WMCSA
1999
IEEE
15 years 4 months ago
TCP Performance in Wireless Multi-hop Networks
In this study we investigate the interaction between TCP and MAC layer in a wireless multi-hop network. Using simulation, we provide new insight into two critical problems of TCP ...
Mario Gerla, Ken Tang, Rajive Bagrodia