Sciweavers

6480 search results - page 106 / 1296
» Proximity Communication and Time
Sort
View
INFOCOM
2002
IEEE
15 years 9 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
NDSS
2002
IEEE
15 years 9 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
ATAL
2008
Springer
15 years 6 months ago
Self-organized flocking with a mobile robot swarm
This paper studies self-organized flocking in a swarm of mobile robots. We present Kobot, a mobile robot platform developed specifically for swarm robotic studies, briefly describ...
Ali Emre Turgut, Hande Çelikkanat, Fatih G&...
INFOCOM
2010
IEEE
15 years 2 months ago
Near-Optimal Power Control in Wireless Networks: A Potential Game Approach
—We study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. Our objective is to design a pow...
Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, ...
PIMRC
2010
IEEE
15 years 2 months ago
Identifying boundaries of dominant regions dictating spectrum sharing opportunities for large secondary networks
An important parameter in determining a spectrum sharing opportunity is the level of interference power that secondary users may generate towards primary users. It is indicated in ...
Muhammad Aljuaid, Halim Yanikomeroglu