Sciweavers

1718 search results - page 11 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
ANSS
2004
IEEE
14 years 14 days ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
MSWIM
2005
ACM
14 years 2 months ago
Performance analysis of differentiated ARQ scheme for video transmission over wireless networks
The Advance in video coding and wireless communication techniques has enabled video-based services to be the most important component of many emerging multimedia applications. The...
Fen Hou, Pin-Han Ho, Yongbing Zhang
INFOCOM
2009
IEEE
14 years 3 months ago
Path Diversity Aware Interdomain Routing
—As the Internet becomes the critical information infrastructure for both personal and business applications, fast and reliable routing protocols need to be designed to maintain ...
Feng Wang, Lixin Gao
COMSIS
2006
100views more  COMSIS 2006»
13 years 8 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
IJCNN
2000
IEEE
14 years 1 months ago
Comparison of a Heuristic Dynamic Programming and a Dual Heuristic Programming Based Adaptive Critics Neurocontroller for a Turb
: This paper presents the design of a neurocontroller for a turbogenerator that augments/replaces the conventional Automatic Voltage Regulator (AVR) and the turbine governor. The n...
Ganesh K. Venayagamoorthy, Ronald G. Harley, Donal...