Sciweavers

5234 search results - page 34 / 1047
» Simulation of Computer Network Attacks
Sort
View
WISEC
2009
ACM
14 years 3 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
NDSS
1998
IEEE
14 years 1 months ago
Distributed Algorithms for Attack Localization in All-Optical Networks
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The a...
Ruth Bergman, Muriel Médard, Serena Chan
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
ANTSW
2010
Springer
13 years 7 months ago
Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation
Activator-inhibitor models have been widely used to explain several morphogenetic processes. They have also been used to engineer algorithms for computer graphics, distributed syst...
Lidia Yamamoto, Daniele Miorandi