Sciweavers

711 search results - page 125 / 143
» Distributed Energy-conserving Routing Protocols
Sort
View
WOWMOM
2005
ACM
148views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks
Both Mobile Ad Hoc Networks (MANETs) and Peer-toPeer (P2P) Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a d...
Leonardo B. Oliveira, Isabela G. Siqueira, Daniel ...
COORDINATION
2008
Springer
14 years 11 months ago
A Process Calculus for Mobile Ad Hoc Networks
We present the -calculus, a process calculus for formally modeling and reasoning about Mobile Ad Hoc Wireless Networks (MANETs) and their protocols. The -calculus naturally capture...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka
CSFW
2007
IEEE
15 years 4 months ago
Secure Implementations for Typed Session Abstractions
mplementations for Typed Session Abstractions Ricardo Corin1,2,3 Pierre-Malo Deni´elou1,2 C´edric Fournet1,2 Karthikeyan Bhargavan1,2 James Leifer1 1 MSR-INRIA Joint Centre 2 Mic...
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...

Publication
279views
16 years 7 months ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain
ICDCS
2009
IEEE
15 years 7 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang