A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Proxy Assignments for Filling Gaps in Wireless Ad-Hoc Lattice Computers
[chapter]
Structural Information and Communication Complexity
for computing proxy assignments for single-row gaps and gaps that are rectangular in shape. ...
Researchers have proposed using such an ensemble of wireless devices to create a wireless ad-hoc lattice computer (WAdL) to harness the collective computing capabilities of the devices for the common cause ...
of bridging gaps in wireless ad-hoc lattice computers by assigning active devices on the perimeter of the gap as proxies to the defective devices in the gap. ...
doi:10.1007/978-3-540-72951-8_17
dblp:conf/sirocco/CalamoneriFSS07
fatcat:4dzussihcvfihhncecwiho6wlu
Great Expectations: The Value of Spatial Diversity in Wireless Networks
2004
Proceedings of the IEEE
In this paper, the effect of spatial diversity on the throughput and reliability of wireless networks is examined. ...
Spatial diversity is realized through multiple independently fading transmit/receive antenna paths in single-user communication and through independently fading links in multiuser communication. ...
The authors would also like to thank the following individuals (in alphabetical order) for many stimulating discussions on the topics of this paper: C. Fragouli, X. Gao, M. Grossglauser, S. ...
doi:10.1109/jproc.2003.821914
fatcat:rdjeepkcqvgynddrnae5ik7loe
Autonomic Response to Distributed Denial of Service Attacks
[chapter]
2001
Lecture Notes in Computer Science
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article. ...
Ad-hoc networking is a core technology for wireless battlefield networks. However, ad-hoc routing protocols to date are totally lacking in security. ...
Ad-Hoc Configuration Wireless battlefield networks are ad-hoc networks with constantly changing topologies. ...
doi:10.1007/3-540-45474-8_9
fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm
Attack Determination and its Security Analysis for Personal Communication in VoIP Networks
2013
IOSR Journal of Computer Engineering
However, the promise of mass VoIP consumption also increases the risk of widespread security violations, spawning a new sense of urgency to fill in potential security gaps now before hackers wreak havoc ...
In Fig. 1 shows a peer-to-peer VoIP network typically consists of a core proxy network and a set of clients that connect to the edge of this proxy network. ...
Alone for their valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this project. ...
doi:10.9790/0661-0920109
fatcat:atnqdia7kbhbtghde74ong6qry
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture
2021
Zenodo
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis ...
With the growing number of smartphone users, peer-to-peer ad hoc content sharing is expected to occur more often. ...
With the growing number of Smartphone users, peer-to-peer ad hoc content sharing is expected to occur more often. ...
doi:10.5281/zenodo.5148421
fatcat:lzanqvxdlre2dh3hdhjxibdrim
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. ...
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section ...
Network Models and Security Issues
Network Models WSN communication usually occurs in ad hoc manner, and shows similarities to wireless ad hoc networks. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
Cybersecurity Challenges Of IoT-enabled Smart Cities: A Survey
[article]
2022
arXiv
pre-print
In this paper, we aim to provide general security guidelines for IoT-enabled smart city developments by 1) presenting some of the latest innovations in IoT-enabled smart cities, and highlighting common ...
Our current infrastructure will have to quickly adapt to handle the big data in our systems, supply interoperability for cross-functional performance, and provide the cognitive capabilities for system ...
As a result, new adaptations of the existing security mechanism or new solutions will be needed for the IoT-enabled smart cities to fill the gap between the security needs and capabilities. ...
arXiv:2202.05023v1
fatcat:p4f5r5elkvdfxeoas3622diovy
Spatial networks
2011
Physics reports
Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. ...
Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields ranging from urbanism to epidemiology. ...
Sensor, ad hoc, and wireless networks. There is of course a huge literature on these subjects, which is mostly found in computer and engineering science. ...
doi:10.1016/j.physrep.2010.11.002
fatcat:mp77spbw2jewvijlttu7y3bktq
Satellite Communications in the New Space Era: A Survey and Future Challenges
[article]
2020
arXiv
pre-print
The present survey aims at capturing the state of the art in SatComs, while highlighting the most promising open research topics. ...
Subsequently, an in-depth literature review is provided across five axes: i) system aspects, ii) air interface, iii) medium access, iv) networking, v) testbeds & prototyping. ...
In this direction, besides the pure research, it is particular important the development of ad-hoc testbeds that allow in lab implementation and validation of precoding schemes. ...
arXiv:2002.08811v2
fatcat:u3uvhm5bovg6povxbwwl5h6rqq
Engineering, Technology & Applied Science Research (ETASR), Vol. 11, No. 4, pp. 7291-7530
2021
Zenodo
The journal was first published in February 2011. ISSN: 1792-8036 and 2241-4487. ...
The table of contents for this issue can be found at: https://etasr.com/index.php/ETASR/issue/view/69. For more info visit the journal's site at: www.etasr.com. ...
The authors in [12] exploited MTD for the security of cyber-physical systems. There is a recent trend of the adaptation of MTD for wireless ad hoc networks as well [13, 14] . ...
doi:10.5281/zenodo.5506592
fatcat:73sj5nawgndeffb26wh6wnux4a
Internet of things security: A top-down survey
2018
Computer Networks
This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors. ...
In this paper, we provide a comprehensive top down survey of the most recent proposed security and privacy solutions in IoT. ...
It is the case, for example, of AMI in smart grids and ad-hoc infrastructures in Vehicular Networks. In [6] , authors interested in healthcare applications. ...
doi:10.1016/j.comnet.2018.03.012
fatcat:xbczp44t6neqxcfy74q6rsvuci
Intrusion-Detection Systems
[chapter]
2012
Handbook of Computer Networks
The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews ...
INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely ...
Sixth Framework Programme -in the framework of the NETQOS project (details can be seen at http://www.netqos.eu/). ...
doi:10.1002/9781118256107.ch26
fatcat:aeidzkegvfc27dqqmztiayv3dm
Context Aware Service Oriented Computing in Mobile Ad Hoc Networks
2005
This thesis explores some of the opportunities and challenges raised by applying the SOC paradigm to mobile computing in ad hoc networks. ...
This thesis explores some of the opportunities and challenges raised by applying the SOC paradigm to mobile computing in ad hoc networks. ...
Coordination models designed for distributed computing in wireless ad hoc networks have been deployed in the past [80] , [32] , etc. ...
doi:10.7936/k7hm56t7
fatcat:mqpmuociyvholmznuvzvoab3vy
Optimizing experimental procedures for quantitative evaluation of crop plant performance in high throughput phenotyping systems
2015
Frontiers in Plant Science
This manuscript describes critical steps in the optimization of procedures for HT plant phenotyping systems. ...
The presented results outline important issues to be considered in the design of HT phenotyping experiments for model and crop plants. ...
For Maize, a volume estimation is used as a proxy for the estimated biomass of the plants. ...
doi:10.3389/fpls.2014.00770
pmid:25653655
pmcid:PMC4299434
fatcat:4k5wi5ib6rblxj7ied4vl34x24
Functional Representation of Prototypes in LVQ and Relevance Learning
[chapter]
2016
Advances in Intelligent Systems and Computing
The overall acceptance rate was 88% (63% for regular papers, 100% for compressed contributions and demonstration abstracts, and 91% for thesis abstracts). ...
In addition to the regular research presentations, posters and demonstrations, we were happy to include several other elements in the program of BNAIC 2016, among which keynote presentations by Marc Cavazza ...
The techniques used in this paper allow for use on other (radicalised) communities as well as building towards automatically detecting radicalism online. ...
doi:10.1007/978-3-319-28518-4_28
fatcat:uwxvq6txmrba3ajulmblafgh2a
« Previous
Showing results 1 — 15 out of 89 results