Sciweavers

412 search results - page 28 / 83
» Single-Sink Network Design with Vertex Connectivity Requirem...
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
13 years 12 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
ICRA
2003
IEEE
178views Robotics» more  ICRA 2003»
14 years 1 months ago
Design of six sigma supply chains
Abstract—Variability reduction and business process synchronization are acknowledged as key to achieving sharp and timely deliveries in supply chain networks. In this paper, we i...
Dinesh Garg, Yadati Narahari, Nukala Viswanadham
GECCO
2006
Springer
154views Optimization» more  GECCO 2006»
13 years 11 months ago
Emergent mating topologies in spatially structured genetic algorithms
The application of network analysis to emergent mating topologies in spatially structured genetic algorithms is presented in this preliminary study as a framework for inferring ev...
Joshua L. Payne, Margaret J. Eppstein
INFOCOM
2006
IEEE
14 years 1 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras