Results 1 - 10
of
1,077
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks
- In SenSys
, 2003
"... The dynamic and lossy nature of wireless communication poses major challenges to reliable, self-organizing multihop networks. These non-ideal characteristics are more problematic with the primitive, low-power radio transceivers found in sensor networks, and raise new issues that routing protocols mu ..."
Abstract
-
Cited by 781 (20 self)
- Add to MetaCart
-node, in-depth empirical experiments. The most effective solution uses a simple time averaged EWMA estimator, frequency based table management, and cost-based routing.
A Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED
- Proc. SIGCOMM 2000
, 2000
"... In this paper we use jump process driven Stochastic Differential Equations to model the interactions of a set of TCP flows and Active Queue Management routers in a network setting. We show how the SDEs can be transformed into a set of Ordinary Differential Equations which can be easily solved numeri ..."
Abstract
-
Cited by 417 (21 self)
- Add to MetaCart
numerically. Our solution methodology scales well to a large number of flows. As an application, we model and solve a system where RED is the AQM policy. Our results show excellent agreement with those of similar networks simulated using the well known ns simulator. Our model enables us to get an in-depth
The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks
, 2003
"... The random waypoint model is a commonly used mobility model in the simulation of ad hoc networks. It is known that the spatial distribution of network nodes moving according to this model is, in general, nonuniform. However, a closed-form expression of this distribution and an in-depth investigation ..."
Abstract
-
Cited by 377 (10 self)
- Add to MetaCart
The random waypoint model is a commonly used mobility model in the simulation of ad hoc networks. It is known that the spatial distribution of network nodes moving according to this model is, in general, nonuniform. However, a closed-form expression of this distribution and an in-depth
In-Depth Study on Synthesis Load Modeling
, 2013
"... Detailed procedures for the modeling of synthesis load models (SLM) of actual power network are presented, then the classification indices based on 1oad characteristics and the principle of load classification are expounded. Based on the results of general investigation of 220 kV and 330 kV substati ..."
Abstract
- Add to MetaCart
into account, are built; and the modeling results are disseminated and applied to whole Chinese power grid. Besides, the load model parameters are evaluated and verified via post-disturbance simulation method. The effectiveness of the built SLM is validated by the fitting of some disturbance incidents.
Bounded-width polynomial-size branching programs recognize exactly those languages
- in NC’, in “Proceedings, 18th ACM STOC
, 1986
"... We show that any language recognized by an NC ’ circuit (fan-in 2, depth O(log n)) can be recognized by a width-5 polynomial-size branching program. As any bounded-width polynomial-size branching program can be simulated by an NC ’ circuit, we have that the class of languages recognized by such prog ..."
Abstract
-
Cited by 270 (14 self)
- Add to MetaCart
We show that any language recognized by an NC ’ circuit (fan-in 2, depth O(log n)) can be recognized by a width-5 polynomial-size branching program. As any bounded-width polynomial-size branching program can be simulated by an NC ’ circuit, we have that the class of languages recognized
A Virtual Honeypot Framework
- In Proceedings of the 13th USENIX Security Symposium
, 2004
"... A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot ..."
Abstract
-
Cited by 252 (5 self)
- Add to MetaCart
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a
Goodput Analysis and Link Adaptation for IEEE 802.11a Wireless LANs
- IEEE Trans. on Mobile Computing
, 2002
"... Abstract—Link adaptation to dynamically select the data transmission rate at a given time has been recognized as an effective way to improve the goodput performance of the IEEE 802.11 wireless local-area networks (WLANs). Recently, with the introduction of the new high-speed 802.11a physical layer ( ..."
Abstract
-
Cited by 145 (11 self)
- Add to MetaCart
, the wireless channel condition, and the frame retry count. At run-time, a wireless station determines the most appropriate PHY mode for the next transmission attempt by a simple table lookup, using the most upto-date system status as the index. Our in-depth simulation shows that the proposed MPDU-based link
Joint determination by Brownian dynamics and fluorescence quenching of the in-depth location profile of
, 2001
"... The in-depth molar distribution function of fluorophores is revealed by a new methodology for fluorescence quenching data analysis in membranes. Brownian dynamics simulation was used to study the in-depth location profile of quenchers. A Lorentzian profile was reached. Since the Stern–Volmer equatio ..."
Abstract
- Add to MetaCart
The in-depth molar distribution function of fluorophores is revealed by a new methodology for fluorescence quenching data analysis in membranes. Brownian dynamics simulation was used to study the in-depth location profile of quenchers. A Lorentzian profile was reached. Since the Stern
In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm
"... Abstract—Detection engines capable of inspecting packet payloads for application-layer network information are urgently required. The most important technology for fast payload inspection is an efficient multipattern matching algorithm, which performs exact string matching between packets and a larg ..."
Abstract
- Add to MetaCart
and hardware implementations. Simulation results reveal that EHMA significantly improves the matching performance. The speed of EHMA is about 0.89-1,161 times faster than that of current matching algorithms. Even under real-life intense attack, EHMA still performs well. Index Terms—Network-level security
Results 1 - 10
of
1,077