Sciweavers

1167 search results - page 149 / 234
» Networking Aspects for Gaming Systems
Sort
View
SAC
2004
ACM
15 years 9 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
WSC
1997
15 years 5 months ago
On the Effect and Control of Self-Similar Network Traffic: A Simulation Perspective
This paper presents a discussion of simulation-related issues arising in the study of self-similar network traffic with respect to its effect and control. Selfsimilar traffic has...
Kihong Park
CORR
2007
Springer
57views Education» more  CORR 2007»
15 years 4 months ago
Smartening the Environment using Wireless Sensor Networks in a Developing Country
 The miniaturization process of various sensing devices has become a reality by enormous research and advancements accomplished in Micro Electro-Mechanical Systems (MEMS) and Ve...
Al-Sakib Khan Pathan, Choong Seon Hong, Hyung-Woo ...
ISSTA
2000
ACM
15 years 8 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...