Sciweavers

595 search results - page 60 / 119
» Survivability Analysis of Network Specifications
Sort
View
WICON
2008
15 years 5 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
PDPTA
2003
15 years 5 months ago
The Performance of Routing Algorithms under Bursty Traffic Loads
Routing algorithms are traditionally evaluated under Poisson-like traffic distributions. This type of traffic is smooth over large time intervals and has been shown not necessaril...
Jeonghee Shin, Timothy Mark Pinkston
BMCBI
2007
111views more  BMCBI 2007»
15 years 4 months ago
Modular co-evolution of metabolic networks
Background: The architecture of biological networks has been reported to exhibit high level of modularity, and to some extent, topological modules of networks overlap with known f...
Jing Zhao, Guohui Ding, Lin Tao, Hong Yu, Zhong-Ha...
FTCS
1993
111views more  FTCS 1993»
15 years 5 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski
BMCBI
2006
118views more  BMCBI 2006»
15 years 4 months ago
Low degree metabolites explain essential reactions and enhance modularity in biological networks
Background: Recently there has been a lot of interest in identifying modules at the level of genetic and metabolic networks of organisms, as well as in identifying single genes an...
Areejit Samal, Shalini Singh, Varun Giri, Sandeep ...