Sciweavers

652 search results - page 66 / 131
» Delay Analysis of Aloha Network
Sort
View
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 10 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
INFOCOM
2002
IEEE
14 years 2 months ago
Application of Network Calculus to General Topologies using Turn-Prohibition
Abstract— Network calculus is known to apply in general only to feedforward routing networks, i.e., networks where routes do not create cycles of interdependent packet flows. In...
David Starobinski, Mark G. Karpovsky, Lev Zakrevsk...
WINET
2008
200views more  WINET 2008»
13 years 9 months ago
Performance evaluation of an IEEE 802.15.4 sensor network with a star topology
One class of applications envisaged for the IEEE 802.15.4 LR-WPAN (low data rate - wireless personal area network) standard is wireless sensor networks for monitoring and control a...
Chandramani Kishore Singh, Anurag Kumar, P. M. Ame...
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 9 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
GLOBECOM
2007
IEEE
14 years 3 months ago
Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks
— In distributed wireless access networks, the short-term unfairness of IEEE 802.11 Distributed Coordination Function (DCF) has been revealed by many works. In this paper, a modi...
Xiaohui Ye, Xin Liu, S. J. Ben Yoo, Zhi Ding