Sciweavers

7300 search results - page 34 / 1460
» Multi-modal network protocols
Sort
View
ICNP
2007
IEEE
15 years 8 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
INFOCOM
2012
IEEE
14 years 7 days ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ADHOC
2010
135views more  ADHOC 2010»
14 years 9 months ago
Efficient broadcast for wireless ad hoc networks with a realistic physical layer
In this paper, we investigate the low coverage problem of efficient broadcast protocols in wireless ad hoc networks with realistic physical layer models. To minimize energy consum...
Hui Xu, J. J. Garcia-Luna-Aceves
CSREASAM
2006
15 years 3 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
WOWMOM
2009
ACM
207views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
Autoconfiguration procedures for multiradio wireless mesh networks based on DHCP protocol
We propose procedures for autoconfiguration of wireless mesh networks based on DHCP protocol. The proposed mechanism provides automatic address and radio parameters set-up for nod...
Krzysztof Grochla, Walter Buga, Piotr Pacyna, Jaro...