Sciweavers

476 search results - page 38 / 96
» Analysis of point-to-point packet delay in an operational ne...
Sort
View
CONEXT
2009
ACM
13 years 10 months ago
EZ-Flow: removing turbulence in IEEE 802.11 wireless mesh networks without message passing
Recent analytical and experimental work demonstrate that IEEE 802.11-based wireless mesh networks are prone to turbulence. Manifestations of such turbulence take the form of large...
Adel Aziz, David Starobinski, Patrick Thiran, Alae...
USS
2010
13 years 6 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
INFOCOM
1997
IEEE
14 years 1 months ago
Investigation of the IEEE 802.11 Medium Access Control (MAC)
Analysis of the drafi IEEE 802.11 wireless local area network (WLAN) standard is needed to characterize the expected performance of the standard’s ad hoc and infrastructure netw...
Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Pres...
GLOBECOM
2010
IEEE
13 years 6 months ago
Capability and Fidelity of Mote-Class Wireless Sniffers
Abstract--Monitoring the health of a sensor network is important for maintaining the health and normal operation of the network. For large-scale cost-effective monitoring, using in...
Jordan Cote, Bing Wang, Wei Zeng, Zhijie Shi
OSDI
2008
ACM
14 years 9 months ago
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
Abstract ? Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple service...
Xu Chen, Ming Zhang, Zhuoqing Morley Mao, Paramvir...