Sciweavers

14850 search results - page 2945 / 2970
» The Security of
Sort
View
TON
2008
108views more  TON 2008»
13 years 7 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
WICOMM
2008
258views more  WICOMM 2008»
13 years 7 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
ATAL
2010
Springer
13 years 6 months ago
On events in multi-robot patrol in adversarial environments
The problem of multi-robot patrol in adversarial environments has been gaining considerable interest during the recent years.In this problem, a team of mobile robots is required t...
Noa Agmon
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 6 months ago
Unified storage systems for distributed Tier-2 centres
The start of data taking at the Large Hadron Collider will herald a new era in data volumes and distributed processing in particle physics. Data volumes of hundreds of Terabytes wi...
Greig A. Cowan, Graeme A. Stewart, Andrew Elwell
FMSD
2010
118views more  FMSD 2010»
13 years 6 months ago
On simulation-based probabilistic model checking of mixed-analog circuits
In this paper, we consider verifying properties of mixed-signal circuits, i.e., circuits for which there is an interaction between analog (continuous) and digital (discrete) values...
Edmund M. Clarke, Alexandre Donzé, Axel Leg...
« Prev « First page 2945 / 2970 Last » Next »