Sciweavers

943 search results - page 147 / 189
» Analysis of Enhanced Deployment Models for Sensor Networks
Sort
View
SIGCOMM
2010
ACM
13 years 8 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 2 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
ICCAD
2003
IEEE
123views Hardware» more  ICCAD 2003»
14 years 5 months ago
The Y-Architecture for On-Chip Interconnect: Analysis and Methodology
The Y-architecture for on-chip interconnect is based on pervasive use of 0-, 120-, and 240-degree oriented semi-global and global wiring. Its use of three uniform directions explo...
Hongyu Chen, Chung-Kuan Cheng, Andrew B. Kahng, Io...
PE
2007
Springer
175views Optimization» more  PE 2007»
13 years 7 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
DMTCS
2010
146views Mathematics» more  DMTCS 2010»
13 years 5 months ago
Tight Bounds for Delay-Sensitive Aggregation
This paper studies the fundamental trade-off between communication cost and delay cost arising in various contexts such as control message aggregation or organization theory. An o...
Yvonne Anne Pignolet, Stefan Schmid, Roger Wattenh...