Sciweavers

7329 search results - page 152 / 1466
» Network Extractor Protocols
Sort
View
146
Voted
NDSS
2008
IEEE
15 years 9 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
139
Voted
BROADNETS
2004
IEEE
15 years 7 months ago
DCC-MAC: A Decentralized MAC Protocol for 802.15.4a-like UWB Mobile Ad-Hoc Networks Based on Dynamic Channel Coding
We present a joint PHY/MAC architecture (DCC-MAC) for 802.15.4a-like networks based on PPM-UWB. Unlike traditional approaches it fully utilizes the specific nature of UWB to achie...
Jean-Yves Le Boudec, Ruben Merz, Bozidar Radunovic...
131
Voted
CN
2006
113views more  CN 2006»
15 years 3 months ago
Failure recovery for structured p2p networks: Protocol design and performance under churn
Measurement studies indicate a high rate of node dynamics in p2p systems. In this paper, we address the question of how high a rate of node dynamics can be supported by structured...
Simon S. Lam, Huaiyu Liu
149
Voted
PERCOM
2006
ACM
15 years 9 months ago
A High-throughput MAC Protocol for Wireless Ad Hoc Networks
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow concurrent transmission among neighboring nodes as much as possible. In ...
Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong ...
HICSS
2005
IEEE
185views Biometrics» more  HICSS 2005»
15 years 9 months ago
HEAR-SN: A New Hierarchical Energy-Aware Routing Protocol for Sensor Networks
Wireless sensor networks are becoming an integral part of numerous applications very quickly. Here, we present a new approach for sensor applications that requires coverage for a ...
Michael Hempel, Hamid Sharif, Prasad Raviraj