Sciweavers

1038 search results - page 181 / 208
» Towards A Peer-to-Peer Simulator
Sort
View
ESORICS
2010
Springer
15 years 2 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
BIOSYSTEMS
2007
90views more  BIOSYSTEMS 2007»
15 years 2 months ago
Directional hearing in a silicon cricket
10 Phonotaxis is the ability to orient towards or away from sound sources. Crickets can locate conspecifics by phonotaxis to the calling (mating) song they produce, and can evade ...
Richard E. Reeve, André van Schaik, Craig T...
CN
2010
152views more  CN 2010»
15 years 2 months ago
An environment-aware mobility model for wireless ad hoc network
Simulation is a cost effective, fast and flexible alternative to test-beds or practical deployment for evaluating the characteristics and potential of mobile ad hoc networks. Sinc...
Sabbir Ahmed, Gour C. Karmakar, Joarder Kamruzzama...
CORR
2010
Springer
160views Education» more  CORR 2010»
15 years 2 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
ADHOC
2006
116views more  ADHOC 2006»
15 years 2 months ago
Efficient clustering algorithms for self-organizing wireless sensor networks
Self-organization of wireless sensor networks, which involves network decomposition into connected clusters, is a challenging task because of the limited bandwidth and energy reso...
Rajesh Krishnan, David Starobinski