• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,077
Next 10 →

Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks

by Alec Woo, Terence Tong, David Culler - In SenSys , 2003
"... The dynamic and lossy nature of wireless communication poses major challenges to reliable, self-organizing multihop networks. These non-ideal characteristics are more problematic with the primitive, low-power radio transceivers found in sensor networks, and raise new issues that routing protocols mu ..."
Abstract - Cited by 781 (20 self) - Add to MetaCart
-node, in-depth empirical experiments. The most effective solution uses a simple time averaged EWMA estimator, frequency based table management, and cost-based routing.

A Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED

by Vishal Misra, WeiBo Gong, Don Towsley - Proc. SIGCOMM 2000 , 2000
"... In this paper we use jump process driven Stochastic Differential Equations to model the interactions of a set of TCP flows and Active Queue Management routers in a network setting. We show how the SDEs can be transformed into a set of Ordinary Differential Equations which can be easily solved numeri ..."
Abstract - Cited by 417 (21 self) - Add to MetaCart
numerically. Our solution methodology scales well to a large number of flows. As an application, we model and solve a system where RED is the AQM policy. Our results show excellent agreement with those of similar networks simulated using the well known ns simulator. Our model enables us to get an in-depth

The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks

by Christian Bettstetter, Giovanni Resta, Paolo Santi , 2003
"... The random waypoint model is a commonly used mobility model in the simulation of ad hoc networks. It is known that the spatial distribution of network nodes moving according to this model is, in general, nonuniform. However, a closed-form expression of this distribution and an in-depth investigation ..."
Abstract - Cited by 377 (10 self) - Add to MetaCart
The random waypoint model is a commonly used mobility model in the simulation of ad hoc networks. It is known that the spatial distribution of network nodes moving according to this model is, in general, nonuniform. However, a closed-form expression of this distribution and an in-depth

In-Depth Study on Synthesis Load Modeling

by Qi Wang, Yong Tang, Bing Zhao , 2013
"... Detailed procedures for the modeling of synthesis load models (SLM) of actual power network are presented, then the classification indices based on 1oad characteristics and the principle of load classification are expounded. Based on the results of general investigation of 220 kV and 330 kV substati ..."
Abstract - Add to MetaCart
into account, are built; and the modeling results are disseminated and applied to whole Chinese power grid. Besides, the load model parameters are evaluated and verified via post-disturbance simulation method. The effectiveness of the built SLM is validated by the fitting of some disturbance incidents.

Article Magnetometer-Augmented IMU Simulator: In-Depth Elaboration

by Thomas Brunner, Sébastien Changey, Michel Basset
"... sensors ..."
Abstract - Add to MetaCart
Abstract not found

Bounded-width polynomial-size branching programs recognize exactly those languages

by A. Barrington - in NC’, in “Proceedings, 18th ACM STOC , 1986
"... We show that any language recognized by an NC ’ circuit (fan-in 2, depth O(log n)) can be recognized by a width-5 polynomial-size branching program. As any bounded-width polynomial-size branching program can be simulated by an NC ’ circuit, we have that the class of languages recognized by such prog ..."
Abstract - Cited by 270 (14 self) - Add to MetaCart
We show that any language recognized by an NC ’ circuit (fan-in 2, depth O(log n)) can be recognized by a width-5 polynomial-size branching program. As any bounded-width polynomial-size branching program can be simulated by an NC ’ circuit, we have that the class of languages recognized

A Virtual Honeypot Framework

by Niels Provos - In Proceedings of the 13th USENIX Security Symposium , 2004
"... A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot ..."
Abstract - Cited by 252 (5 self) - Add to MetaCart
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a

Goodput Analysis and Link Adaptation for IEEE 802.11a Wireless LANs

by Daji Qiao, Student Member, Sunghyun Choi, Kang G. Shin - IEEE Trans. on Mobile Computing , 2002
"... Abstract—Link adaptation to dynamically select the data transmission rate at a given time has been recognized as an effective way to improve the goodput performance of the IEEE 802.11 wireless local-area networks (WLANs). Recently, with the introduction of the new high-speed 802.11a physical layer ( ..."
Abstract - Cited by 145 (11 self) - Add to MetaCart
, the wireless channel condition, and the frame retry count. At run-time, a wireless station determines the most appropriate PHY mode for the next transmission attempt by a simple table lookup, using the most upto-date system status as the index. Our in-depth simulation shows that the proposed MPDU-based link

Joint determination by Brownian dynamics and fluorescence quenching of the in-depth location profile of

by unknown authors , 2001
"... The in-depth molar distribution function of fluorophores is revealed by a new methodology for fluorescence quenching data analysis in membranes. Brownian dynamics simulation was used to study the in-depth location profile of quenchers. A Lorentzian profile was reached. Since the Stern–Volmer equatio ..."
Abstract - Add to MetaCart
The in-depth molar distribution function of fluorophores is revealed by a new methodology for fluorescence quenching data analysis in membranes. Brownian dynamics simulation was used to study the in-depth location profile of quenchers. A Lorentzian profile was reached. Since the Stern

In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm

by Tzu-fang Sheu, Nen-fu Huang, Hsiao-ping Lee
"... Abstract—Detection engines capable of inspecting packet payloads for application-layer network information are urgently required. The most important technology for fast payload inspection is an efficient multipattern matching algorithm, which performs exact string matching between packets and a larg ..."
Abstract - Add to MetaCart
and hardware implementations. Simulation results reveal that EHMA significantly improves the matching performance. The speed of EHMA is about 0.89-1,161 times faster than that of current matching algorithms. Even under real-life intense attack, EHMA still performs well. Index Terms—Network-level security
Next 10 →
Results 1 - 10 of 1,077
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University