Sciweavers

1534 search results - page 150 / 307
» networks 2011
Sort
View
DEBS
2011
ACM
14 years 8 months ago
End-to-end reliability for best-effort content-based publish/subscribe networks
When it comes to reliability in distributed publish/subscribe systems, there are two main categories of systems: reliable systems and best-effort systems. The former category giv...
Amirhossein Malekpour, Antonio Carzaniga, Fernando...
150
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 11 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
ASUNAM
2011
IEEE
14 years 4 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos
ICDCS
2011
IEEE
14 years 4 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu