Sciweavers

604 search results - page 77 / 121
» Modeling the adoption of new network architectures
Sort
View
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 7 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
IMC
2006
ACM
14 years 1 months ago
A structural approach to latency prediction
Several models have been recently proposed for predicting the latency of end to end Internet paths. These models treat the Internet as a black-box, ignoring its internal structure...
Harsha V. Madhyastha, Thomas E. Anderson, Arvind K...
APNOMS
2006
Springer
13 years 11 months ago
"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization
Peer-to-Peer systems are based on the concept of resources localization and mutualization in dynamic context. In specific environment such as mobile networks, characterized by high...
Mourad Amad, Ahmed Meddahi
IWANN
2001
Springer
14 years 5 days ago
From Embryonics to POEtic Machines
The space of bio-inspired hardware can be partitioned along three axes: phylogeny, ontogeny, and epigenesis. We refer to this as the POE model. Our Embryonics (for embryonic electr...
Daniel Mange, André Stauffer, Gianluca Temp...
DAC
2003
ACM
14 years 8 months ago
Design techniques for sensor appliances: foundations and light compass case study
We propose the first systematic, sensor-centric approach for quantitative design of sensor network appliances. We demonstrate its use by designing light appliance devices and the ...
Jennifer L. Wong, Seapahn Megerian, Miodrag Potkon...