89 Hits in 6.6 sec

Proxy Assignments for Filling Gaps in Wireless Ad-Hoc Lattice Computers [chapter]

Tiziana Calamoneri, Emanuele G. Fusco, Anil M. Shende, Sunil M. Shende
Structural Information and Communication Complexity  
for computing proxy assignments for single-row gaps and gaps that are rectangular in shape.  ...  Researchers have proposed using such an ensemble of wireless devices to create a wireless ad-hoc lattice computer (WAdL) to harness the collective computing capabilities of the devices for the common cause  ...  of bridging gaps in wireless ad-hoc lattice computers by assigning active devices on the perimeter of the gap as proxies to the defective devices in the gap.  ... 
doi:10.1007/978-3-540-72951-8_17 dblp:conf/sirocco/CalamoneriFSS07 fatcat:4dzussihcvfihhncecwiho6wlu

Great Expectations: The Value of Spatial Diversity in Wireless Networks

S.N. Diggavi, N. Al-Dhahir, A. Stamoulis, A.R. Calderbank
2004 Proceedings of the IEEE  
In this paper, the effect of spatial diversity on the throughput and reliability of wireless networks is examined.  ...  Spatial diversity is realized through multiple independently fading transmit/receive antenna paths in single-user communication and through independently fading links in multiuser communication.  ...  The authors would also like to thank the following individuals (in alphabetical order) for many stimulating discussions on the topics of this paper: C. Fragouli, X. Gao, M. Grossglauser, S.  ... 
doi:10.1109/jproc.2003.821914 fatcat:rdjeepkcqvgynddrnae5ik7loe

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  Ad-hoc networking is a core technology for wireless battlefield networks. However, ad-hoc routing protocols to date are totally lacking in security.  ...  Ad-Hoc Configuration Wireless battlefield networks are ad-hoc networks with constantly changing topologies.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

Dr.K. Venkatachalapathy
2013 IOSR Journal of Computer Engineering  
However, the promise of mass VoIP consumption also increases the risk of widespread security violations, spawning a new sense of urgency to fill in potential security gaps now before hackers wreak havoc  ...  In Fig. 1 shows a peer-to-peer VoIP network typically consists of a core proxy network and a set of clients that connect to the edge of this proxy network.  ...  Alone for their valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this project.  ... 
doi:10.9790/0661-0920109 fatcat:atnqdia7kbhbtghde74ong6qry

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  With the growing number of smartphone users, peer-to-peer ad hoc content sharing is expected to occur more often.  ...  With the growing number of Smartphone users, peer-to-peer ad hoc content sharing is expected to occur more often.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  Network Models and Security Issues Network Models WSN communication usually occurs in ad hoc manner, and shows similarities to wireless ad hoc networks.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Cybersecurity Challenges Of IoT-enabled Smart Cities: A Survey [article]

Jiani Fan, Wenzhuo Yang, Kwok-Yan Lam
2022 arXiv   pre-print
In this paper, we aim to provide general security guidelines for IoT-enabled smart city developments by 1) presenting some of the latest innovations in IoT-enabled smart cities, and highlighting common  ...  Our current infrastructure will have to quickly adapt to handle the big data in our systems, supply interoperability for cross-functional performance, and provide the cognitive capabilities for system  ...  As a result, new adaptations of the existing security mechanism or new solutions will be needed for the IoT-enabled smart cities to fill the gap between the security needs and capabilities.  ... 
arXiv:2202.05023v1 fatcat:p4f5r5elkvdfxeoas3622diovy

Spatial networks

Marc Barthélemy
2011 Physics reports  
Complex systems are very often organized under the form of networks where nodes and edges are embedded in space.  ...  Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields ranging from urbanism to epidemiology.  ...  Sensor, ad hoc, and wireless networks. There is of course a huge literature on these subjects, which is mostly found in computer and engineering science.  ... 
doi:10.1016/j.physrep.2010.11.002 fatcat:mp77spbw2jewvijlttu7y3bktq

Satellite Communications in the New Space Era: A Survey and Future Challenges [article]

O. Kodheli, E. Lagunas, N. Maturo, S. K. Sharma, B. Shankar, J. F. Mendoza Montoya, J. C. Merlano Duncan, D. Spano, S. Chatzinotas, S. Kisseleff, J. Querol, L. Lei (+2 others)
2020 arXiv   pre-print
The present survey aims at capturing the state of the art in SatComs, while highlighting the most promising open research topics.  ...  Subsequently, an in-depth literature review is provided across five axes: i) system aspects, ii) air interface, iii) medium access, iv) networking, v) testbeds & prototyping.  ...  In this direction, besides the pure research, it is particular important the development of ad-hoc testbeds that allow in lab implementation and validation of precoding schemes.  ... 
arXiv:2002.08811v2 fatcat:u3uvhm5bovg6povxbwwl5h6rqq

Engineering, Technology & Applied Science Research (ETASR), Vol. 11, No. 4, pp. 7291-7530

2021 Zenodo  
The journal was first published in February 2011. ISSN: 1792-8036 and 2241-4487.  ...  The table of contents for this issue can be found at: For more info visit the journal's site at:  ...  The authors in [12] exploited MTD for the security of cyber-physical systems. There is a recent trend of the adaptation of MTD for wireless ad hoc networks as well [13, 14] .  ... 
doi:10.5281/zenodo.5506592 fatcat:73sj5nawgndeffb26wh6wnux4a

Internet of things security: A top-down survey

Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef
2018 Computer Networks  
This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors.  ...  In this paper, we provide a comprehensive top down survey of the most recent proposed security and privacy solutions in IoT.  ...  It is the case, for example, of AMI in smart grids and ad-hoc infrastructures in Vehicular Networks. In [6] , authors interested in healthcare applications.  ... 
doi:10.1016/j.comnet.2018.03.012 fatcat:xbczp44t6neqxcfy74q6rsvuci

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews  ...  INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely  ...  Sixth Framework Programme -in the framework of the NETQOS project (details can be seen at  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

Context Aware Service Oriented Computing in Mobile Ad Hoc Networks

Radu Handorean
This thesis explores some of the opportunities and challenges raised by applying the SOC paradigm to mobile computing in ad hoc networks.  ...  This thesis explores some of the opportunities and challenges raised by applying the SOC paradigm to mobile computing in ad hoc networks.  ...  Coordination models designed for distributed computing in wireless ad hoc networks have been deployed in the past [80] , [32] , etc.  ... 
doi:10.7936/k7hm56t7 fatcat:mqpmuociyvholmznuvzvoab3vy

Optimizing experimental procedures for quantitative evaluation of crop plant performance in high throughput phenotyping systems

Astrid Junker, Moses M. Muraya, Kathleen Weigelt-Fischer, Fernando Arana-Ceballos, Christian Klukas, Albrecht E. Melchinger, Rhonda C. Meyer, David Riewe, Thomas Altmann
2015 Frontiers in Plant Science  
This manuscript describes critical steps in the optimization of procedures for HT plant phenotyping systems.  ...  The presented results outline important issues to be considered in the design of HT phenotyping experiments for model and crop plants.  ...  For Maize, a volume estimation is used as a proxy for the estimated biomass of the plants.  ... 
doi:10.3389/fpls.2014.00770 pmid:25653655 pmcid:PMC4299434 fatcat:4k5wi5ib6rblxj7ied4vl34x24

Functional Representation of Prototypes in LVQ and Relevance Learning [chapter]

Friedrich Melchert, Udo Seiffert, Michael Biehl
2016 Advances in Intelligent Systems and Computing  
The overall acceptance rate was 88% (63% for regular papers, 100% for compressed contributions and demonstration abstracts, and 91% for thesis abstracts).  ...  In addition to the regular research presentations, posters and demonstrations, we were happy to include several other elements in the program of BNAIC 2016, among which keynote presentations by Marc Cavazza  ...  The techniques used in this paper allow for use on other (radicalised) communities as well as building towards automatically detecting radicalism online.  ... 
doi:10.1007/978-3-319-28518-4_28 fatcat:uwxvq6txmrba3ajulmblafgh2a
« Previous Showing results 1 — 15 out of 89 results