Sciweavers

208 search results - page 26 / 42
» Analysis and algorithms for partial protection in mesh netwo...
Sort
View
SASN
2006
ACM
14 years 1 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 1 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
AINA
2009
IEEE
14 years 2 months ago
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks
In this paper we present a low-complexity traffic prioritization strategy for video transmission using the H.264 scalable video coding (SVC) standard over 802.11e wireless networ...
Dario Gallucci, Attilio Fiandrotti, Enrico Masala,...
DAS
2006
Springer
13 years 9 months ago
Extraction and Analysis of Document Examiner Features from Vector Skeletons of Grapheme 'th'
Abstract. This paper presents a study of 25 structural features extracted from samples of grapheme `th' that correspond to features commonly used by forensic document examiner...
Vladimir Pervouchine, Graham Leedham
EGC
2005
Springer
14 years 28 days ago
Rapid Distribution of Tasks on a Commodity Grid
The global internet is rich in commodity resources but scarce in specialized resources. We argue that a grid framework can achieve better performance if it separates the management...
Ladislau Bölöni, Damla Turgut, Taskin Ko...