Sciweavers

2715 search results - page 149 / 543
» Network bucket testing
Sort
View
TRIDENTCOM
2005
IEEE
14 years 2 months ago
A Testbed and Methodology for Experimental Evaluation of Wireless Mobile Ad hoc Networks
Wireless mobile ad hoc network experimentation is subjected to stochastic factors from the radio environment and node mobility. To achieve test repeatability and result reproducib...
Erik Nordström, Per Gunningberg, Henrik Lundg...
PODC
2005
ACM
14 years 2 months ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod
WOWMOM
2005
ACM
115views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Precise Distributed Localization Algorithms for Wireless Networks
We propose in this paper reliable and precise distributed localization algorithms for wireless networks: iterative multidimensional scaling (IT-MDS) and simulated annealing multid...
Saad Biaz, Yiming Ji
ADHOCNOW
2005
Springer
14 years 2 months ago
An Intelligent Sensor Network for Oceanographic Data Acquisition
In this paper we describe the deployment of an offshore wireless sensor network and the lightweight intelligence that was integrated into the data acquisition and forwarding softwa...
Chris M. Roadknight, Antonio González, Laur...
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
14 years 2 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood