Sciweavers

3319 search results - page 98 / 664
» The topology of dark networks
Sort
View
IFIP
2003
Springer
14 years 4 months ago
A Probabilistic Topology Unaware TDMA Medium Access Control Policy for Ad Hoc Environments
The design of an efficient Medium Access Control (MAC) is challenging in ad-hoc networks where users can enter, leave or move inside the network without any need for prior configu...
Konstantinos Oikonomou, Ioannis Stavrakakis
ADHOCNOW
2008
Springer
14 years 5 months ago
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simpl...
Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach
CORR
2006
Springer
110views Education» more  CORR 2006»
13 years 11 months ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja
COMSWARE
2007
IEEE
14 years 5 months ago
Survivable Routing in WDM Weighted Networks
: In this paper, we investigate the problem of routing lightpaths on an arbitrary physical topology following a Design Protection approach, such that virtual topology remains conne...
Debasis Mandal, Satyajit Nath, Bivas Mitra
ACMACE
2009
ACM
14 years 3 months ago
Familiars: representing Facebook users' social behaviour through a reflective playful experience
In this paper, we describe the design and development of a social game called Familiars. Inspired by the daemons in Pullman’s “Dark Material” trilogy, Familiars are animal c...
Ben Kirman, Eva Ferrari, Shaun Lawson, Jonathan Fr...