Sciweavers

5234 search results - page 178 / 1047
» Simulation of Computer Network Attacks
Sort
View
PERCOM
2006
ACM
16 years 1 months ago
A Simulation-Based Study on the Throughput Capacity of Topology Control in CSMA/CA Networks
Although it is commonly assumed that the use of topology control can improve the throughput capacity of wireless networks, analytical results on this topic are sometimes contradic...
Douglas M. Blough, Cyrus Harvesf, Giovanni Resta, ...
SCFBM
2008
119views more  SCFBM 2008»
15 years 1 months ago
Boolean network simulations for life scientists
Modern life sciences research increasingly relies on computational solutions, from large scale data analyses to theoretical modeling. Within the theoretical models Boolean network...
István Albert, Juilee Thakar, Song Li, Ranr...
TWC
2008
129views more  TWC 2008»
15 years 2 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
JSAC
2006
183views more  JSAC 2006»
15 years 2 months ago
HiRLoc: high-resolution robust localization for wireless sensor networks
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...
Loukas Lazos, Radha Poovendran
PODC
2004
ACM
15 years 7 months ago
Computation in networks of passively mobile finite-state sensors
We explore the computational power of networks of small resource-limited mobile agents. We define two new models of computation based on pairwise interactions of finite-state ag...
Dana Angluin, James Aspnes, Zoë Diamadi, Mich...