Sciweavers

5234 search results - page 134 / 1047
» Simulation of Computer Network Attacks
Sort
View
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 9 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
IROS
2007
IEEE
93views Robotics» more  IROS 2007»
14 years 3 months ago
Computational sensor networks
— We propose Computational Sensor Networks as a methodology to exploit models of physical phenomena in order to better understand the structure of the sensor network. To do so, i...
Thomas C. Henderson, Christopher A. Sikorski, Edwa...
BMCBI
2011
13 years 28 days ago
Acorn: A grid computing system for constraint based modeling and visualization of the genome scale metabolic reaction networks v
Background: Constraint-based approaches facilitate the prediction of cellular metabolic capabilities, based, in turn on predictions of the repertoire of enzymes encoded in the gen...
Jacek Sroka, Lukasz Bieniasz-Krzywiec, Szymon Gwoz...
ICUMT
2009
13 years 7 months ago
An efficient solution for max-min fair rate allocation in P2P simulation
Abstract--With the rapid development of peer-to-peer networks, simulation is considered as a useful tool to demonstrate initial ideas before building prototypes with real network t...
Anh Tuan Nguyen, Frank Eliassen
CCR
2007
176views more  CCR 2007»
13 years 9 months ago
Enhanced wireless mesh networking for ns-2 simulator
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
Vivek Mhatre