Sciweavers

2473 search results - page 431 / 495
» The Logic of Communication Graphs
Sort
View
154
Voted
ESA
2005
Springer
176views Algorithms» more  ESA 2005»
15 years 9 months ago
On Degree Constrained Shortest Paths
Abstract. Traditional shortest path problems play a central role in both the design and use of communication networks and have been studied extensively. In this work, we consider a...
Samir Khuller, Kwangil Lee, Mark A. Shayman
139
Voted
ICICS
2005
Springer
15 years 9 months ago
PCAV: Internet Attack Visualization on Parallel Coordinates
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
Hyunsang Choi, Heejo Lee
ICICS
2005
Springer
15 years 9 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
132
Voted
SIGCOMM
2004
ACM
15 years 9 months ago
Routing in a delay tolerant network
We formulate the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be kn...
Sushant Jain, Kevin R. Fall, Rabin K. Patra
130
Voted
ICCS
2004
Springer
15 years 9 months ago
An Exportable CGIF Module from the CP Environment: A Pragmatic Approach
We have upgraded the Conceptual Programming Environment (CP) from a single standalone application to a set of component modules to increase flexibility of the environment and to a...
Heather D. Pfeiffer