Sciweavers

2135 search results - page 99 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
GC
2004
Springer
14 years 1 months ago
A Physics-Style Approach to Scalability of Distributed systems
Abstract. Is it possible to treat large scale distributed systems as physical systems? The importance of that question stems from the fact that the behavior of many P2P systems is ...
Erik Aurell, Sameh El-Ansary
PDCN
2004
13 years 9 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
DCOSS
2005
Springer
14 years 1 months ago
Analysis of Gradient-Based Routing Protocols in Sensor Networks
Abstract. Every physical event results in a natural information gradient in the proximity of the phenomenon. Moreover, many physical phenomena follow the diffusion laws. This natu...
Jabed Faruque, Konstantinos Psounis, Ahmed Helmy
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
14 years 2 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...