Sciweavers

7329 search results - page 123 / 1466
» Network Extractor Protocols
Sort
View
JSAC
2008
125views more  JSAC 2008»
15 years 3 months ago
RIPT: A Receiver-Initiated Reservation-Based Protocol for Underwater Acoustic Networks
Although there are many MAC protocols that have been proposed for terrestrial wireless networks with a wide variety of aspects, these protocols cannot be applied directly in underw...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
CORR
2010
Springer
218views Education» more  CORR 2010»
15 years 19 days ago
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANE...
Busola S. Olagbegi, Natarajan Meghanathan
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
IJAHUC
2010
245views more  IJAHUC 2010»
15 years 1 months ago
Cross-layer Mobile Chord P2P protocol design for VANET
Abstract: Efficient content distribution is one of the emerging applications in vehicular networks. To provide scalable content distribution in vehicular networks, Chord peer-to-pe...
Che-Liang Liu, Chih-Yu Wang, Hung-Yu Wei
124
Voted
SENSYS
2009
ACM
15 years 10 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...