Sciweavers

642 search results - page 126 / 129
» Detecting Spoofed Packets
Sort
View
94
Voted
MSWIM
2004
ACM
15 years 2 months ago
Exploring long lifetime routing (LLR) in ad hoc networks
In mobile ad hoc networks, node mobility causes links between nodes to break frequently, thus terminating the lifetime of the routes containing those links. An alternative route h...
Zhao Cheng, Wendi Beth Heinzelman
SAINT
2003
IEEE
15 years 2 months ago
On Control Parameters Tuning for Active Queue Management Mechanisms using Multivariate Analysis
In recent years, AQM (Active Queue Management) mechanisms, which support the end-to-end congestion control mechanism of TCP by performing congestion control at a router, have been...
Tomoya Eguchi, Hiroyuki Ohsaki, Masayuki Murata
101
Voted
WS
2003
ACM
15 years 2 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
15 years 2 months ago
An error-correcting unordered code and hardware support for robust asynchronous global communication
A new delay-insensitive data encoding scheme for global asynchronous communication is introduced. The goal of this work is to combine the timing-robustness of delay-insensitive (i....
Melinda Y. Agyekum, Steven M. Nowick
INFOCOM
2000
IEEE
15 years 1 months ago
Analytic Evaluation of RED Performance
— End-to-end congestion control mechanisms such as those in TCP are not enough to prevent congestion collapse in the Internet (for starters, not all applications might be willing...
Thomas Bonald, Martin May, Jean-Chrysostome Bolot