Sciweavers

537 search results - page 2 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
13 years 11 months ago
Reducing the Forwarding State Requirements of Point-to-Multipoint Trees Using MPLS Multicast
IP multicast was first proposed to improve the performance of applications that require group communications. Still, many years after its initial proposal, IP multicast is not wi...
George Apostolopoulos, Ioana Ciurea
ICMCS
2008
IEEE
164views Multimedia» more  ICMCS 2008»
13 years 11 months ago
A comparative study of network transport protocols for in-vehicle media streaming
We analyze and compare various transport protocols in the context of wireless in-vehicle IP-based audio and video communication. We determine the most appropriate transport protoc...
Mehrnoush Rahmani, Andrea Pettiti, Ernst Biersack,...
INFOCOM
2006
IEEE
13 years 11 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
WISES
2008
13 years 6 months ago
Establishing wireless time-triggered communication using a firefly clock synchronization approach
In South-East Asia, huge swarms of fireflies synchronously emit light flashes to attract mating partners. The underlying principle can be used to implement a robust and scalable d...
Robert Leidenfrost, Wilfried Elmenreich
INFOCOM
2005
IEEE
13 years 11 months ago
A comparative study of multicast protocols: top, bottom, or in the middle?
— Multicast solutions have been evolving from “bottom” to “top”, i.e., from IP layer (called IP multicast) to application layer (referred to as application layer multicas...
Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorin...