Fair cache sharing and partitioning in a chip multiprocessor architecture

S Kim, D Chandra, Y Solihin - Proceedings. 13th International …, 2004 - ieeexplore.ieee.org
This paper presents a detailed study of fairness in cache sharing between threads in a chip
multiprocessor (CMP) architecture. Prior work in CMP architectures has only studied …

Mesh segmentation-a comparative study

M Attene, S Katz, M Mortara, G Patané… - … on Shape Modeling …, 2006 - ieeexplore.ieee.org
Mesh segmentation has become an important component in many applications in computer
graphics. In the last several years, many algorithms have been proposed in this growing …

Dtnma: identifying routing attacks in delay-tolerant network

S Chatterjee, M Nandan, A Ghosh, S Banik - Cyber Intelligence and …, 2022 - Springer
The delay-tolerant networks (DTNs) are mainly characterized by decentralized and self-
managed structures possessing unique features and characteristics. However, limited …

A privacy-preserving and secure framework for opportunistic routing in DTNs

L Zhang, J Song, J Pan - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
Opportunistic routing has been extensively studied and utilized in delay/disruption-tolerant
networks. The extensive use of nodes' local information, eg, the distance to the destination …

Resilience and security of opportunistic communications for emergency evacuation

G Gorbil, E Gelenbe - Proceedings of the 7th ACM workshop on …, 2012 - dl.acm.org
We describe an autonomous emergency support system (ESS) based on opportunistic
communications (oppcomms) to support navigation and evacuation of civilians in built …

Mitigating the ack counterfeiting attack in delay and disruption tolerant networks

JF Naves, IM Moraes - 2017 IEEE Symposium on Computers …, 2017 - ieeexplore.ieee.org
Routing protocols for Delay and Disruption Tolerant Networks (DTNs) are prone to suffer
from malicious behavior of nodes. Particularly, in the acknowledgment counterfeiting attack …

Sprp: a secured routing protocol for delay tolerant networks

Swati, JS Sivia, HS Bindra - International Journal of Sensor …, 2019 - inderscienceonline.com
A delay tolerant network (DTN) depends on certain assumptions that nodes cooperate and
coordinate towards message forwarding. However, this assumption cannot be satisfied if …

No way out: Emergency evacuation with no internet access

G Gorbil - 2015 IEEE International Conference on Pervasive …, 2015 - ieeexplore.ieee.org
In urban emergencies and disasters, Internet connectivity is commonly unavailable to a
large number of civilians in the affected area since the cellular network infrastructure and …

Design, implementation and analysis of routing based attack model for delay tolerant networks for prophet routing protocol

S Bansal, JS Sivia, HS Bindra - International Journal of …, 2019 - inderscienceonline.com
Delay tolerant network (DTN) is an evolution of mobile adhoc network (MANET). In
computing, network security is the main issue as the attacks by malicious and selfish nodes …

Taxonomy of reputation-based defending mechanisms against types of attacks in delay tolerant networks

P Nagrath, S Aneja, GN Purohit - International Journal of …, 2021 - inderscienceonline.com
Delay tolerant networks (DTNs) have been standardised as a solution for wireless
networking scenarios with intermittent connectivity. Limited buffer space and limited battery …