Search
Products meeting the search criteria
Interactivity Constrained Server Provisioning in Large Scale Distributed Virtual Environments
Maintaining interactivity is one of the key challenges of distributed virtual environments.eg: onlin..
Interference Based Topology Control Algorithm for Delay Constrained Mobile Ad Hoc Networks
As the foundation of routing, topology control should minimize the interference among nodes, and inc..
Intrusion Detection in Wireless Sensor Network
The rapid proliferation of wireless networks has changed the landscape of network security. The rece..
jamming aware traffic allocation for multiple path routing using portfolio selection
This Paper consider the problem of jamming aware source routing. Multiple-path source routing protoc..
Jamming Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment..
Jelly Fish attack Analysis, detection and countermeasure in TCP based MANET
MANET is a collection of mobile nodes communicating in a multi hop manner without any fixed infrastr..
Joint static and dynamic traffic scheduling in Data Center Networks
Data center is a pool of resources (computational, storage, network) interconnected using a communic..
Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks
Virtual multi-input multi-output (MIMO) or vMIMO is becoming an attractive technology to achieve spa..
Least Cost Influence Maximization Across Multiple Social Networks
Recently, in online s..
LEISURE Load Balanced Network Wide Traffic Measurement and Monitor Placement
Network-wide traffic measurement is of interest to network operators to uncover global network behav..
Live Video Forensics Source Identification in Lossy Wireless Networks
The system present a coherent, discriminative framework for simultaneously tracking multiple people ..
Load Balancing in IP Networks Using Generalized Destination Based Multipath Routing
Intra domain traffic engineering (TE) has become an indispensable tool for Internet service provider..
Load Balancing Under Heavy Traffic in RPL Routing Protocol for Low Power and Lossy Networks
—RPL is an IPv6 routing protocol for low-power and lossy networks (LLNs) designed to meet the requir..
Low Rate DoS Attacks Detection Based on Network Multi fractal
The Internet is on the way of becoming the universal communication network, and then needs to provid..
Malware Propagation in Large-Scale Networks
Malware is pervasive in networks, and poses a critical threat to network security. However, we have ..