Sciweavers

1718 search results - page 21 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
PAISI
2007
Springer
14 years 2 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
ICC
2007
IEEE
14 years 3 months ago
Overlay Partition: Iterative Detection and Proactive Recovery
— Overlay networks provide infrastructures for a large variety of Internet applications, like file sharing, online gaming, and multimedia streaming. However, these networks ofte...
Tongqing Qiu, Edward Chan, Guihai Chen
NOCS
2007
IEEE
14 years 3 months ago
On the Design of a Photonic Network-on-Chip
Recent remarkable advances in nanoscale siliconphotonic integrated circuitry specifically compatible with CMOS fabrication have generated new opportunities for leveraging the uni...
Assaf Shacham, Keren Bergman, Luca P. Carloni
CN
2002
169views more  CN 2002»
13 years 8 months ago
A new wireless ad hoc multicast routing protocol
An ad hoc network is a multi-hop wireless network of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and mobility require that ad hoc routing prot...
Seungjoon Lee, Chongkwon Kim