Sciweavers

150 search results - page 20 / 30
» Agent-Based Network Protection Against Malicious Code
Sort
View
NDSS
2003
IEEE
14 years 22 days ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
ICDCS
2008
IEEE
14 years 1 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
MOBIQUITOUS
2008
IEEE
14 years 1 months ago
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of the...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
VTC
2010
IEEE
171views Communications» more  VTC 2010»
13 years 5 months ago
Optimum Physical-Layer Frame Size for Maximising the Application-Layer Rateless Code's Effective Throughput
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Tim Stevens, Robert G. Maunder, Lajos Hanzo
ICC
2009
IEEE
112views Communications» more  ICC 2009»
14 years 2 months ago
Towards Secure Spectrum Decision
—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
Goce Jakimoski, K. P. Subbalakshmi