Sciweavers

1737 search results - page 186 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ENTCS
2007
168views more  ENTCS 2007»
15 years 5 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
GAMESEC
2010
150views Game Theory» more  GAMESEC 2010»
15 years 3 months ago
Adversarial Control in a Delay Tolerant Network
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
Eitan Altman, Tamer Basar, Veeraruna Kavitha
135
Voted
EUROPAR
2005
Springer
15 years 10 months ago
New Bounds on the Competitiveness of Randomized Online Call Control in Cellular Networks
Abstract. We address the call control problem in wireless cellular networks that utilize Frequency Division Multiplexing (FDM) technology. In such networks, many users within the s...
Ioannis Caragiannis, Christos Kaklamanis, Evi Papa...
COMCOM
2007
156views more  COMCOM 2007»
15 years 4 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
CCS
2008
ACM
15 years 7 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...