Sciweavers

635 search results - page 110 / 127
» Localized Bridging Centrality for Distributed Network Analys...
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
ACSAC
2005
IEEE
14 years 2 months ago
TARP: Ticket-based Address Resolution Protocol
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft of IP-based imperson...
Wesam Lootah, William Enck, Patrick McDaniel
ISCC
2005
IEEE
146views Communications» more  ISCC 2005»
14 years 2 months ago
A Credit-Based On-Demand QoS Routing Protocol over Bluetooth WPANs
The quality-of-service (QoS) communication that supports mobile applications to guarantee bandwidth utilization is an important issue for Bluetooth wireless personal area networks...
Yuh-Shyan Chen, Keng-Shau Liu, Yun-Wei Lin
AP2PC
2005
Springer
14 years 2 months ago
Highly Available DHTs: Keeping Data Consistency After Updates
Abstract. The research in the paper is motivated by building a decentralized/P2P XML storage on top of a DHT (Distributed Hash Table). The storage must provide high data availabili...
Predrag Knezevic, Andreas Wombacher, Thomas Risse
INFOCOM
2007
IEEE
14 years 3 months ago
Iterative Scheduling Algorithms
— The input-queued switch architecture is widely used in Internet routers due to its ability to run at very high line speeds. A central problem in designing an input-queued switc...
Mohsen Bayati, Balaji Prabhakar, Devavrat Shah, Ma...