Sciweavers

11752 search results - page 2289 / 2351
» Those
Sort
View
ICICS
2010
Springer
14 years 7 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
IMC
2010
ACM
14 years 7 months ago
On the characteristics and reasons of long-lived internet flows
Prior studies of Internet traffic have considered traffic at different resolutions and time scales: packets and flows for hours or days, aggregate packet statistics for days or we...
Lin Quan, John Heidemann
IMC
2010
ACM
14 years 7 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
IPPS
2010
IEEE
14 years 7 months ago
Modeling and analyzing the effects of firewalls and NATs in P2P swarming systems
Many P2P systems have been designed without taking into account an important factor: a large fraction of Internet users nowadays are located behind a network address translator (NA...
Lucia D'Acunto, Michel Meulpolder, Rameez Rahman, ...
IPPS
2010
IEEE
14 years 7 months ago
On the parallelisation of MCMC-based image processing
Abstract--The increasing availability of multi-core and multiprocessor architectures provides new opportunities for improving the performance of many computer simulations. Markov C...
Jonathan M. R. Byrd, Stephen A. Jarvis, Abhir H. B...
« Prev « First page 2289 / 2351 Last » Next »