Sciweavers

169 search results - page 24 / 34
» A Heuristic Routing Mechanism Using a New Addressing Scheme
Sort
View
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
15 years 5 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
IWNAS
2008
IEEE
15 years 6 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
JPDC
2006
133views more  JPDC 2006»
14 years 11 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
ICC
2000
IEEE
376views Communications» more  ICC 2000»
15 years 4 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi
NETWORKING
2000
15 years 1 months ago
Network-Driven Layered Multicast with IPv6
Receiver-driven Layered Multicast (RLM) has previously been proposed to distribute video over the best-effort heterogeneous IP networks. Although RLM can avoid network overloading ...
Ho-pong Sze, Soung C. Liew