Sciweavers

6202 search results - page 134 / 1241
» Without Loss of Generality
Sort
View
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 6 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
MASCOTS
2007
15 years 5 months ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...
CN
2007
116views more  CN 2007»
15 years 4 months ago
Joint call and packet QoS in cellular packet networks
This paper proposes a novel call admission control scheme capable of providing a combination of call and packet level quality of service requirements in cellular packet networks. ...
Majid Ghaderi, Raouf Boutaba, Gary W. Kenward
JSAC
2008
97views more  JSAC 2008»
15 years 4 months ago
Spectrally-efficient relay selection with limited feedback
This paper addresses the multiplexing loss that occurs in relay networks due to causality of relays and the halfduplex constraint. We devise relay selection methods to recover the ...
Ramy Tannious, Aria Nosratinia
TON
2008
84views more  TON 2008»
15 years 4 months ago
Trajectory sampling with unreliable reporting
We define and evaluate methods to perform robust network monitoring using trajectory sampling in the presence of report loss. The first challenge is to reconstruct an unambiguous s...
Nick G. Duffield, Matthias Grossglauser