Sciweavers

1318 search results - page 82 / 264
» Measuring network security using dynamic bayesian network
Sort
View
JSAC
2006
167views more  JSAC 2006»
15 years 2 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
ISBI
2008
IEEE
16 years 3 months ago
Inferring functional connectivity using spatial modulation measures of fMRI signals within brain regions of interest
We propose inferring functional connectivity between brain regions by examining the spatial modulation of the blood oxygen level dependent (BOLD) signals within brain regions of i...
Bernard Ng, Rafeef Abugharbieh, Martin J. McKeown
IMC
2004
ACM
15 years 7 months ago
Debugging DHCP performance
Dynamic Host Configuration Protocol (DHCP) was defined to facilitate automatic configuration of IP addresses and other network parameters to hosts in a network. Efficiency of D...
Vladimir Brik, Jesse Stroik, Suman Banerjee
124
Voted
SAINT
2008
IEEE
15 years 8 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
CORR
2010
Springer
164views Education» more  CORR 2010»
15 years 22 days ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....