Sciweavers

2484 search results - page 235 / 497
» Polymatroids with Network Coding
Sort
View
TKDE
2010
272views more  TKDE 2010»
13 years 9 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta

Lecture Notes
773views
15 years 8 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
IWANN
2009
Springer
14 years 5 months ago
Introducing a Distributed Architecture for Heterogeneous Wireless Sensor Networks
This paper presents SYLPH, a novel distributed architecture which integrates a service-oriented approach into Wireless Sensor Networks. One of the characteristics of SYLPH is that ...
Dante I. Tapia, Ricardo S. Alonso, Juan Francisco ...
IPPS
2007
IEEE
14 years 5 months ago
A Framework for Modeling Operating System Mechanisms in the Simulation of Network Protocols for Real-Time Distributed Systems
In this paper we present a software tool for the simulation of distributed real-time embedded systems. Our tool is based on the popular NS-2 package for simulating the networking ...
Paolo Pagano, Prashant Batra, Giuseppe Lipari
IPPS
2006
IEEE
14 years 4 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah