Sciweavers

1718 search results - page 289 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
WMASH
2004
ACM
14 years 1 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
LCN
2003
IEEE
14 years 29 days ago
Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes
This paper proposes a new framework in mobile ad hoc networks (MANET) for reliable multipath routing with fixed delays based on packet level Forward Error Control (FEC). The nove...
Rui Ma, Jacek Ilow
IPSN
2003
Springer
14 years 27 days ago
Energy Based Acoustic Source Localization
A novel source localization approach using acoustic energy measurements from the individual sensors in the sensor field is presented. This new approach is based on the acoustic en...
Xiaohong Sheng, Yu Hen Hu
DSN
2002
IEEE
14 years 20 days ago
Detection of Invalid Routing Announcement in the Internet
Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...
CCR
2004
113views more  CCR 2004»
13 years 7 months ago
Implementing aggregation and broadcast over Distributed Hash Tables
Peer-to-peer (P2P) networks represent an effective way to share information, since there are no central points of failure or bottleneck. However, the flip side to the distributive...
Ji Li, Karen R. Sollins, Dah-Yoh Lim