Sciweavers

741 search results - page 103 / 149
» Tools and techniques for Network Forensics
Sort
View
SAC
2009
ACM
14 years 3 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
INFOCOM
2007
IEEE
14 years 3 months ago
Stochastic Analysis and Improvement of the Reliability of DHT-Based Multicast
Abstract— This paper investigates the reliability of applicationlevel multicast based on a distributed hash table (DHT) in a highly dynamic network. Using a node residual lifetim...
Guang Tan, Stephen A. Jarvis
IPSN
2007
Springer
14 years 3 months ago
Acoustic source localization using the acoustic ENSBox
Field biologists use animal sounds to discover the presence of individuals and to study their behavior. The recent development of new deployable acoustic sensor platforms presents...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
MINENET
2006
ACM
14 years 2 months ago
Toward sophisticated detection with distributed triggers
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...
PAM
2005
Springer
14 years 2 months ago
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
Abstract. While several algorithms have been created to actively measure the end-to-end available bandwidth of a network path, they require instrumentation at both ends of the path...
Marcia Zangrilli, Bruce Lowekamp