Sciweavers

785 search results - page 39 / 157
» Cache Behavior of Network Protocols
Sort
View
IWIA
2003
IEEE
14 years 26 days ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
ADHOC
2008
88views more  ADHOC 2008»
13 years 7 months ago
Increasing fairness and efficiency using the MadMac protocol in ad hoc networks
Abstract. The IEEE 802.11 MAC layer is known for its unfairness behavior in ad hoc networks. Introducing fairness in the 802.11 MAC protocol may lead to a global throughput decreas...
Tahiry Razafindralambo, Isabelle Guérin Las...
WICSA
2004
13 years 9 months ago
The DiPS+ Software Architecture for Self-healing Protocol Stacks
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...
ICCL
1998
IEEE
13 years 12 months ago
A Lightweight Object Migration Protocol
This paper presents a lightweight object migration protocol that preserves centralized object semantics yet allows for precise prediction of network behavior. The protocol is impl...
Peter Van Roy, Per Brand, Seif Haridi, Raphaë...
ENTCS
2007
98views more  ENTCS 2007»
13 years 7 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...