Sciweavers

149 search results - page 22 / 30
» Design of Network Topology in an Adversarial Environment
Sort
View
MSWIM
2005
ACM
14 years 1 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
IPCCC
2005
IEEE
14 years 1 months ago
MMAC: a mobility-adaptive, collision-free MAC protocol for wireless sensor networks
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor no...
Muneeb Ali, T. Suleman, Zartash Afzal Uzmi
IJSNET
2006
131views more  IJSNET 2006»
13 years 7 months ago
Medium access control with mobility-adaptive mechanisms for wireless sensor networks
: Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor n...
Muneeb Ali, Zartash Afzal Uzmi
TRIDENTCOM
2010
IEEE
13 years 5 months ago
TopHat: Supporting Experiments through Measurement Infrastructure Federation
Researchers use the PlanetLab testbed for its ability to host experimental applications in realistic conditions over the public besteffort internet. Such applications form overlays...
Thomas Bourgeau, Jordan Augé, Timur Friedma...
ANCS
2011
ACM
12 years 7 months ago
A Scalability Study of Enterprise Network Architectures
The largest enterprise networks already contain hundreds of thousands of hosts. Enterprise networks are composed of Ethernet subnets interconnected by IP routers. These routers re...
Brent Stephens, Alan L. Cox, Scott Rixner, T. S. E...