Sciweavers

5079 search results - page 155 / 1016
» Hidden-Action in Network Routing
Sort
View
92
Voted
MSWIM
2005
ACM
15 years 3 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
SIGMETRICS
2011
ACM
296views Hardware» more  SIGMETRICS 2011»
14 years 29 days ago
Cellular data network infrastructure characterization and implication on mobile content placement
Despite the tremendous growth in the cellular data network usage due to the popularity of smartphones, so far there is rather limited understanding of the network infrastructure o...
Qiang Xu, Junxian Huang, Zhaoguang Wang, Feng Qian...
INFOCOM
2010
IEEE
14 years 8 months ago
Dynamic Control of Coding in Delay Tolerant Networks
Abstract--We study replication mechanisms that include ReedSolomon type codes as well as network coding in order to improve the probability of successful delivery within a given ti...
Eitan Altman, Francesco De Pellegrini, Lucile Sass...
86
Voted
INFOCOM
2012
IEEE
13 years 18 days ago
Comparing alternative approaches for networking of named objects in the future Internet
Abstract—This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme prop...
Akash Baid, Tam Vu, Dipankar Raychaudhuri
79
Voted
AIMS
2007
Springer
15 years 4 months ago
RAQNet: A Topology-Aware Overlay Network
Peer-to-peer overlay networks provide a useful infrastructure for building distributed applications. These networks provide efficient and fault-tolerant routing and object locating...
Seyed Iman Mirrezaei, Javad Shahparian, Mohammad G...