Sciweavers

11580 search results - page 2044 / 2316
» Communication vs. Computation
Sort
View
IJNSEC
2008
175views more  IJNSEC 2008»
15 years 5 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das
CCR
2007
115views more  CCR 2007»
15 years 5 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
116
Voted
CCR
2007
76views more  CCR 2007»
15 years 5 months ago
Reducing the TCP acknowledgment frequency
Delayed acknowledgments were introduced to conserve network and host resources. Further reduction of the acknowledgment frequency can be motivated in the same way. However, reduci...
Sara Landström, Lars-Åke Larzon
163
Voted
CCR
2007
85views more  CCR 2007»
15 years 5 months ago
Don't optimize existing protocols, design optimizable protocols
As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of...
Jiayue He, Jennifer Rexford, Mung Chiang
CCR
2007
104views more  CCR 2007»
15 years 5 months ago
Internet clean-slate design: what and why?
Many believe that it is impossible to resolve the challenges facing today’s Internet without rethinking the fundamental assumptions and design decisions underlying its current a...
Anja Feldmann
« Prev « First page 2044 / 2316 Last » Next »