Sciweavers

1278 search results - page 243 / 256
» Architectures for Controller Based CDP
Sort
View
ACMSE
2007
ACM
13 years 11 months ago
Minimizing broadcast latency in ad hoc wireless networks
Network wide broadcasting in ad-hoc wireless networks provides important control and route establishment functionality for a number of unicast and multicast protocols. In broadcas...
Shankar M. Banik, Sridhar Radhakrishnan
FSKD
2010
Springer
241views Fuzzy Logic» more  FSKD 2010»
13 years 7 months ago
FUZPAG: A fuzzy-controlled packet aggregation scheme for wireless mesh networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop backhaul networks in which mesh routers relay traffic on behalf of clients or other routers. Due to large MAC layer ov...
Peter Dely, Andreas Kassler, Nico Bayer, Hans Joac...
IMCS
2007
77views more  IMCS 2007»
13 years 7 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
TECS
2008
122views more  TECS 2008»
13 years 7 months ago
Quantitative analysis of the speed/accuracy trade-off in transaction level modeling
tion. Transaction Level Modeling (TLM) has been proposed to abstract communication for highspeed system simulation and rapid design space exploration. Although being widely accepte...
Gunar Schirner, Rainer Dömer
TMC
2010
179views more  TMC 2010»
13 years 6 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera