Sciweavers

4345 search results - page 667 / 869
» Temporal Constraint Networks
Sort
View
SASN
2003
ACM
14 years 1 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
ICNP
2000
IEEE
14 years 14 days ago
TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains
Today’s universal communications increasingly involve mobile and battery-powered devices (e.g. hand-held, laptop) over wired and wireless networks. Energy efficiency, as well as...
Vassilios Tsaoussidis, Hussein G. Badr
CSFW
2010
IEEE
13 years 12 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
GLOBECOM
2007
IEEE
13 years 12 months ago
On Optimal Admission Control for Multi-Service Cellular/WLAN Interworking
Abstract-- The complementary characteristics of cellular systems and wireless local area networks (WLANs) make them attractive candidates to jointly offer a seamless wireless solut...
Enrique Stevens-Navarro, Amir Hamed Mohsenian Rad,...
ACSAC
2006
IEEE
13 years 11 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark