Sciweavers

2200 search results - page 20 / 440
» Hop Integrity in Computer Networks
Sort
View
NSDI
2008
13 years 9 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
WISEC
2009
ACM
14 years 2 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
ISPA
2004
Springer
14 years 26 days ago
An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks
Abstract. In mobile ad hoc networks (MANETs), networks can be partitioned into clusters. Clustering algorithms are localized algorithms that have the property of creating an upper ...
Wei Lou, Jie Wu
SRDS
2008
IEEE
14 years 1 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
WCNC
2010
IEEE
13 years 11 months ago
Optimality of Diagonalization of Multicarrier Multi-Hop Linear Non-Regenerative MIMO Relays
Abstract—In this paper, a multicarrier multi-hop multipleinput multiple-output (MIMO) relay system is investigated. A linear non-regenerative strategy is applied at each relay no...
Yue Rong, Yingbo Hua