Sciweavers

1331 search results - page 93 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
CEEMAS
2007
Springer
15 years 4 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 2 months ago
Growth and Propagation of Disturbances in a Communication Network Model
In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Ana...
David E. Newman, Nathaniel D. Sizemore, Vickie E. ...
TELSYS
2010
147views more  TELSYS 2010»
14 years 4 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
INFOCOM
2002
IEEE
15 years 2 months ago
Analysis of Combined Adaptive Bandwidth Allocation and Admission Control in Wireless Networks
Abstract— An analytical model is developed for cellular networks with a combined adaptive bandwidth allocation and trafficrestriction mechanism. Instead of focusing only on the ...
Chun-Ting Chou, Kang G. Shin
78
Voted
WCNC
2008
IEEE
15 years 4 months ago
Analysis of Interference from Large Clusters as Modeled by the Sum of Many Correlated Lognormals
Abstract—We examine the statistical distribution of the interference produced by a cluster of very many co-channel interferers, e.g., a sensor network, or a city full of active w...
Sebastian S. Szyszkowicz, Halim Yanikomeroglu