Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ICCNMC
2005
Springer
10 years 7 months ago
Least Cost Multicast Spanning Tree Algorithm for Local Computer Network
This study deals with the topology discovery for the capacitated minimum spanning tree network. The problem is composed of finding the best way to link nodes to a source node and, ...
Yong-Jin Lee, Mohammed Atiquzzaman
ICCNMC
2005
Springer
10 years 7 months ago
Curve-Based Greedy Routing Algorithm for Sensor Networks
Routing packets along a specified curve is a new approach to forwarding packets in large-scale dense sensor networks. Forwarding packets along trajectories can be very effective in...
Jin Zhang, Yaping Lin, Mu Lin, Ping Li, Si-wang Zh...
ICCNMC
2005
Springer
10 years 7 months ago
SAS: A Scalar Anonymous Communication System
Anonymity technologies have gained more and more attention for communication privacy. In general, users obtain anonymity at a certain cost in an anonymous communication system, whi...
Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, J...
ICCNMC
2005
Springer
10 years 7 months ago
Data Structure Optimization of AS_PATH in BGP
With the fast growing size and complexity of core network, the hash based data structure of current AS_PATH implementation in BGP is facing challenges in performance, mainly caused...
Weirong Jiang
ICCNMC
2005
Springer
10 years 7 months ago
Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks
This paper proposes a set of novel multicast algorithms for m-D mesh overlay networks that can achieve shorter multicast delay and less resource consumptions. In contrast to previo...
Weijia Jia, Wanqing Tu, Jie Wu
ICCNMC
2005
Springer
10 years 7 months ago
An Aided Congestion Avoidance Mechanism for TCP Vegas
TCP Vegas detects network congestion in the early stage and successfully prevents periodic packet loss that usually occurs in TCP Reno. It has been demonstrated that TCP Vegas achi...
Cheng-Yuan Ho, Chen-Hua Shih, Yaw-Chung Chen, Yi-C...
ICCNMC
2005
Springer
10 years 7 months ago
On Mitigating Network Partitioning in Peer-to-Peer Massively Multiplayer Games
Recently, peer-to-peer infrastructure has been proposed to support massively multiplayer games in the literature. However, when underlying network partitions due to network outages...
Yuan He, Yi Zhang, Jiang Guo
ICCNMC
2005
Springer
10 years 7 months ago
Sensor Network Configuration Under Physical Attacks
— In this paper, we address a sensor network lifetime problem that maintains a certain throughput in an environment where physical node destruction is possible. While lifetime is...
Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellapp...
ICCNMC
2005
Springer
10 years 7 months ago
Provable Security of ID-Based Proxy Signature Schemes
Chunxiang Gu, Yuefei Zhu
ICCNMC
2005
Springer
10 years 7 months ago
Modeling and Performance Evaluation of Handover Service in Wireless Networks
With the development of wireless network, more and more applications require the QoS for message transmission. In order to enhance the QoS service in the dynamic changing wireless ...
Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang
books