Sciweavers

2484 search results - page 235 / 497
» Polymatroids with Network Coding
Sort
View
TKDE
2010
272views more  TKDE 2010»
15 years 21 days ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
287
Voted

Lecture Notes
773views
17 years 11 days ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
IWANN
2009
Springer
15 years 9 months ago
Introducing a Distributed Architecture for Heterogeneous Wireless Sensor Networks
This paper presents SYLPH, a novel distributed architecture which integrates a service-oriented approach into Wireless Sensor Networks. One of the characteristics of SYLPH is that ...
Dante I. Tapia, Ricardo S. Alonso, Juan Francisco ...
IPPS
2007
IEEE
15 years 8 months ago
A Framework for Modeling Operating System Mechanisms in the Simulation of Network Protocols for Real-Time Distributed Systems
In this paper we present a software tool for the simulation of distributed real-time embedded systems. Our tool is based on the popular NS-2 package for simulating the networking ...
Paolo Pagano, Prashant Batra, Giuseppe Lipari
IPPS
2006
IEEE
15 years 8 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah