Sciweavers

5079 search results - page 24 / 1016
» Hidden-Action in Network Routing
Sort
View
ENTCS
2008
390views more  ENTCS 2008»
14 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
TCOM
2010
168views more  TCOM 2010»
14 years 4 months ago
A unified analysis of routing protocols in MANETs
This paper presents a mathematical framework for the evaluation of the performance of proactive and reactive routing protocols in mobile ad hoc networks (MANETs). This unified fram...
Hui Xu, Xianren Wu, Hamid R. Sadjadpour, J. J. Gar...
ICMCS
2000
IEEE
91views Multimedia» more  ICMCS 2000»
15 years 2 months ago
Distributed QoS Routing for Multimedia Traffic
The goal of QoS routing is to find a loopless path through a network that can satisfy a given set of constraints on parameters such as bandwidth, delay and cost. QoS routing algo...
Venkatesh Sarangan, Donna Ghosh, Raj Acharya
COMCOM
2002
139views more  COMCOM 2002»
14 years 9 months ago
Improving TCP handoff performance in Mobile IP based networks
Mobile IP has been designed to support host mobility over the Internet. In this paper, we show that in most cases the smooth handoff by the route optimization of the Mobile IP sta...
Doo Seop Eom, HeyungSub Lee, Masashi Sugano, Masay...
IMC
2010
ACM
14 years 7 months ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...