Sciweavers

5056 search results - page 71 / 1012
» Network Coding Theory
Sort
View
MOBIHOC
2008
ACM
14 years 10 months ago
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks
We present BEND, a MAC layer solution to practical network coding in multi-hop wireless networks. It is the first exploration of the broadcasting nature of wireless channels to pr...
Jian Zhang
INFOCOM
2007
IEEE
14 years 4 months ago
Optimization Based Rate Control for Multicast with Network Coding
— Recent advances in network coding have shown great potential for efficient information multicasting in communication networks, in terms of both network throughput and network ...
Lijun Chen, Tracey Ho, Steven H. Low, Mung Chiang,...
DASC
2006
IEEE
14 years 4 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
WISEC
2009
ACM
14 years 5 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
DIMVA
2009
13 years 11 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono