Sciweavers

1266 search results - page 32 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PPSN
2004
Springer
15 years 5 months ago
Evaluation of Adaptive Nature Inspired Task Allocation Against Alternate Decentralised Multiagent Strategies
Adaptive multiagent algorithms based upon the behaviour of social insects are powerful decentralised systems capable of solving complex problems. The intelligence of such a system ...
Richard Price, Peter Tiño
WINET
2010
179views more  WINET 2010»
14 years 10 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ICDCS
2005
IEEE
15 years 5 months ago
Resilient Localization for Sensor Networks in Outdoor Environments
The process of computing the physical locations of nodes in a wireless sensor network is known as localization. Selflocalization is critical for large-scale sensor networks becaus...
YoungMin Kwon, Kirill Mechitov, Sameer Sundresh, W...
SECON
2010
IEEE
14 years 9 months ago
Distributed Routing, Relay Selection, and Spectrum Allocation in Cognitive and Cooperative Ad Hoc Networks
Throughput maximization is a key challenge in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hopby-hop. To ach...
Lei Ding, Tommaso Melodia, Stella N. Batalama, Joh...
ICCSA
2005
Springer
15 years 5 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...