Sciweavers

1440 search results - page 17 / 288
» A protocol for packet network intercommunication
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 6 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
CDC
2010
IEEE
294views Control Systems» more  CDC 2010»
14 years 6 months ago
Adaptive self-triggered control over IEEE 802.15.4 networks
The communication protocol IEEE 802.15.4 is becoming pervasive for low power and low data rate wireless sensor networks (WSNs) applications, including control and automation. Never...
Ubaldo Tiberi, Carlo Fischione, Karl Henrik Johans...
TON
1998
116views more  TON 1998»
14 years 11 months ago
Explicit allocation of best-effort packet delivery service
— This paper presents the “allocated-capacity” framework for providing different levels of best-effort service in times of network congestion. The “allocatedcapacity” fra...
David D. Clark, Wenjia Fang
121
Voted
PRDC
2002
IEEE
15 years 4 months ago
Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks
This paper reevaluates the multicast protocols for MANETs in terms of energy efficiency and proposes a new robust multicast protocol, called Two-Tree Multicast (TTM). Multicast pr...
Sangman Moh, Chansu Yu, Ben Lee, Hee Yong Youn
ICCCN
1998
IEEE
15 years 4 months ago
Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc
We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for a...
Samir Ranjan Das, Robert Castañeda, Jiangta...