Sciweavers

1615 search results - page 192 / 323
» Distributed Forward Checking
Sort
View
127
Voted
PDP
2008
IEEE
15 years 9 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
127
Voted
EUROMICRO
2007
IEEE
15 years 9 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
154
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS Attacks
—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
Vamsi Paruchuri, Arjan Durresi, Raj Jain
121
Voted
ICC
2007
IEEE
184views Communications» more  ICC 2007»
15 years 9 months ago
Lifetime Improvement of Wireless Sensor Networks by Collaborative Beamforming and Cooperative Transmission
Abstract— Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensor ...
Zhu Han, Harold Vincent Poor
130
Voted
IPPS
2007
IEEE
15 years 9 months ago
Packet Reordering in Network Processors
Network processors today consists of multiple parallel processors (microengines) with support for multiple threads to exploit packet level parallelism inherent in network workload...
S. Govind, R. Govindarajan, Joy Kuri