Sciweavers

1852 search results - page 97 / 371
» Block-level link analysis
Sort
View
139
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
ICC
2007
IEEE
172views Communications» more  ICC 2007»
15 years 8 months ago
Performance Analysis of Cooperative Diversity Using Equal Gain Combining (EGC) Technique Over Rayleigh Fading Channels
Abstract— Cooperative diversiy is a promising technology for future wireless networks. In this paper, based on the moment generating function (MGF), we derive exact closed-form e...
Salama Ikki, Mohamed H. Ahmed
ICC
2007
IEEE
140views Communications» more  ICC 2007»
15 years 8 months ago
Performance Analysis for Overlay Multicast on Tree and M-D Mesh Topologies
— Without the multicast support from the underlying networks, overlay multicast has the advantage of implementing inter-domain multicast communications. Usually, overlay multicas...
Wanqing Tu
111
Voted
IPPS
2007
IEEE
15 years 8 months ago
A Combinatorial Analysis of Distance Reliability in Star Network
This paper addresses a constrained two-terminal reliability measure referred to as Distance Reliability (DR) between the source node u and the destination node I with the shortest...
Xiaolong Wu, Shahram Latifi, Yingtao Jiang
HPCC
2007
Springer
15 years 8 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong