Sciweavers

Share
ISCC
2009
IEEE
262views Communications» more  ISCC 2009»
9 years 6 months ago
Babelchord: a social tower of DHT-based overlay networks
Chord is a protocol to distribute and retrieve information at large scale. It builds a large but rigid overlay network without taking into account the social nature and the underl...
Luigi Liquori, Cédric Tedeschi, Francesco B...
ISCC
2009
IEEE
158views Communications» more  ISCC 2009»
9 years 6 months ago
Connectivity and critical point behavior in mobile ad hoc and sensor networks
— A well-known approach to increase the resilience of mobile ad hoc networks (MANETs) and unstructured sensor networks is to ensure a network topology where there are at least k ...
Tae-Hoon Kim, David Tipper, Prashant Krishnamurthy
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
9 years 6 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ISCC
2009
IEEE
198views Communications» more  ISCC 2009»
9 years 6 months ago
An analysis of the heterogeneity and IP packet reordering over multiple wireless networks
Abstract—With the increasing deployment of wireless technologies, such as WLAN, HSDPA, and WiMAX, it is often the case that simultaneous coverage of several access networks is av...
Dominik Kaspar, Kristian Evensen, Audun Fosselie H...
ISCC
2009
IEEE
152views Communications» more  ISCC 2009»
9 years 6 months ago
Perceptual based voice multi-hop transmission over wireless sensor networks
Abstract—Multimedia applications over wireless sensor networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services...
M. Petracca, G. Litovsky, A. Rinotti, Marco Tacca,...
ISCC
2009
IEEE
201views Communications» more  ISCC 2009»
9 years 6 months ago
Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environments
Routing protocols for Wireless Sensor Networks (WSN) face three major performance challenges. The first one is an efficient use of bandwidth that minimizes the transfer delay of p...
Thomas A. Babbitt, Christopher Morrell, Boleslaw K...
ISCC
2009
IEEE
151views Communications» more  ISCC 2009»
9 years 6 months ago
Hardware implementation of session initiation protocol servers and clients
—This paper presents a reconfigurable architecture for the session initiation protocol (SIP). SIP is a protocol used primarily to establish point-to-point sessions between users...
Raymond Peterkin, Mohamed Abou-Gabal, Fadi El-Hass...
ISCC
2009
IEEE
250views Communications» more  ISCC 2009»
9 years 6 months ago
Access point-coordinated contention resolution for channel access in wireless LANs
MAHBOOB, AHMED M. Access Point-Coordinated Contention Resolution for Channel Access in Wireless LANs. (Under the direction of Assistant Professor Khaled A. Harfoush.) The most wid...
Ahmed M. Mahboob, Manjunath M. Prabhu, Khaled A. H...
ISCC
2009
IEEE
201views Communications» more  ISCC 2009»
9 years 6 months ago
Adaptive Smooth Simulcast Protocol for multimedia transmission
We introduce Adaptive Smooth Simulcast Protocol (ASSP) for simulcast transmission over best-effort networks. ASSP is a new multiple-rate protocol that implements a single rate TCP...
Christos Bouras, Apostolos Gkamas, Georgios Kioumo...
ISCC
2009
IEEE
136views Communications» more  ISCC 2009»
9 years 6 months ago
Design and evaluation of a BitTorrent proxy for energy saving
Recent studies indicate that the Internet-related energy consumption represents a significant, and increasing, part of the overall energy consumption of our society. The largest c...
Giuseppe Anastasi, Marco Conti, Ilaria Giannetti, ...
books