Sciweavers

163 search results - page 14 / 33
» Building heterogeneous peer-to-peer networks: protocol and a...
Sort
View
MASCOTS
1993
15 years 2 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long
CCS
2008
ACM
15 years 3 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
SIGCOMM
1995
ACM
15 years 5 months ago
Two Issues in Reservation Establishment
This paper addresses two issues related to resource reservation establishment in packet switched networks o ering realtime services. The rst issue arises out of the natural tensi...
Scott Shenker, Lee Breslau
MSWIM
2009
ACM
15 years 6 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...
IPSN
2003
Springer
15 years 6 months ago
A Robust Data Delivery Protocol for Large Scale Sensor Networks
Although data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking, how to reliably deliver sensing data through a vast field...
Fan Ye, Gary Zhong, Songwu Lu, Lixia Zhang