Sciweavers

357 search results - page 64 / 72
» An Approach to Detect Executable Content for Anomaly Based N...
Sort
View
MASCOTS
2010
13 years 9 months ago
Expanding the Event Horizon in Parallelized Network Simulations
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technolog...
Georg Kunz, Olaf Landsiedel, Stefan Götz, Kla...
PERCOM
2003
ACM
14 years 7 months ago
Energy-Aware Target Localization in Wireless Sensor Networks
Wireless distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization. Energy is a ...
Yi Zou, Krishnendu Chakrabarty
EUC
2006
Springer
13 years 11 months ago
Prediction Efficiency in Predictive p-CSMA/CD
Predictive p-persistent CSMA protocol is an important MAC solution developed for networked sensor/control applications and used in Local Operating Networks (LonWorks) technology. T...
Marek Miskowicz
INFOCOM
2009
IEEE
14 years 2 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...
IMC
2006
ACM
14 years 1 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta