Sciweavers

1266 search results - page 6 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
EUROPAR
2006
Springer
13 years 11 months ago
Comparison of Different Methods for Next Location Prediction
Next location prediction anticipates a person's movement based on the history of previous sojourns. It is useful for proactive actions taken to assist the person in an ubiquit...
Jan Petzold, Faruk Bagci, Wolfgang Trumler, Theo U...
INFOCOM
2012
IEEE
11 years 9 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
COMCOM
2011
13 years 2 months ago
Evaluation of a new method for measuring the internet degree distribution: Simulation results
Many contributions rely on the degree distribution of the Internet topology. However, current knowledge of this property is based on biased and erroneous measurements and is subje...
Christophe Crespelle, Fabien Tarissan
EUROPAR
2005
Springer
14 years 25 days ago
INSEE: An Interconnection Network Simulation and Evaluation Environment
In this paper we introduce INSEE, an environment to help in the design of interconnection networks for parallel computing systems. It contains two basic modules: a system to genera...
Francisco Javier Ridruejo Perez, José Migue...
ICNP
2009
IEEE
14 years 1 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...