Sciweavers

1833 search results - page 311 / 367
» Mechanized Verification with Sharing
Sort
View
EJWCN
2010
118views more  EJWCN 2010»
14 years 11 months ago
Field Division Routing
Multi-hop communication objectives and constraints impose a set of challenging requirements that create difficult conditions for simultaneous optimization of features such as scala...
Milenko Drinic, Darko Kirovski, Lin Yuan, Gang Qu,...
HOTNETS
2010
14 years 11 months ago
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
TMC
2010
137views more  TMC 2010»
14 years 11 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
CHI
2011
ACM
14 years 8 months ago
Target assistance for subtly balancing competitive play
In games where skills such as targeting are critical to winning, it is difficult for players with different skill levels to have a competitive and engaging experience. Although se...
Scott Bateman, Regan L. Mandryk, Tadeusz Stach, Ca...
COMSUR
2011
251views Hardware» more  COMSUR 2011»
14 years 4 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...