Sciweavers

5792 search results - page 1065 / 1159
» Communicating With Multiple Agents
Sort
View
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 3 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
ICC
2008
IEEE
160views Communications» more  ICC 2008»
14 years 3 months ago
Localization via TDOA in a UWB Sensor Network using Neural Networks
In an Ultra-wide band (UWB) sensor network signal reflections from objects can be used to accurately determine the location. UWB signals are preferred in these types of sensor ne...
Salih Ergüt, Ramesh R. Rao, Özgür D...
INFOCOM
2008
IEEE
14 years 3 months ago
On Reducing Mesh Delay for Peer-to-Peer Live Streaming
—Peer-to-peer (P2P) technology has emerged as a promising scalable solution for live streaming to large group. In this paper, we address the design of overlay which achieves low ...
Dongni Ren, Y.-T. Hillman Li, Shueng-Han Gary Chan
INFOCOM
2008
IEEE
14 years 3 months ago
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks
— Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functiona...
Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun ...
INFOCOM
2008
IEEE
14 years 3 months ago
Link Lifetimes and Randomized Neighbor Selection in DHTs
—Several models of user churn, resilience, and link lifetime have recently appeared in the literature [12], [13], [34], [35]; however, these results do not directly apply to clas...
Zhongmei Yao, Dmitri Loguinov
« Prev « First page 1065 / 1159 Last » Next »