Sciweavers

5234 search results - page 154 / 1047
» Simulation of Computer Network Attacks
Sort
View
ESANN
2008
13 years 11 months ago
Computational model for amygdala neural networks
We present a computational model of amygdala neural networks. It is used to simulate neuronal activation in amygdala nuclei at different stages of aversive conditioning experiments...
Jean Marc Salotti
DCOSS
2008
Springer
13 years 11 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
WCNC
2010
IEEE
14 years 1 months ago
Experiences and Lessons from Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator
—We describe our experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of th...
Yuri Tselishchev, Athanassios Boulis, Lavy Libman
HIPC
2003
Springer
14 years 2 months ago
Mapping Hypercube Computations onto Partitioned Optical Passive Star Networks
This paper shows that an n = 2k processor Partitioned Optical Passive Stars (POPS) network with g groups and d processors per group can simulate either a mono-directional move of a...
Alessandro Mei, Romeo Rizzi
EUROMICRO
2004
IEEE
14 years 1 months ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...