Sciweavers

7329 search results - page 186 / 1466
» Network Extractor Protocols
Sort
View
155
Voted
IPCCC
2005
IEEE
15 years 9 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
144
Voted
IWDC
2005
Springer
139views Communications» more  IWDC 2005»
15 years 9 months ago
A New Routing Protocol in Ad Hoc Networks with Unidirectional Links
Most of the proposed algorithms in ad hoc networks assume homogeneous nodes with similar transmission range and capabilities. However, in heterogeneous ad hoc network, it is not ne...
Deepesh Man Shrestha, Young-Bae Ko
121
Voted
ISCC
2003
IEEE
113views Communications» more  ISCC 2003»
15 years 8 months ago
CSMA/IC: A New Class of Collision-free MAC Protocols for Ad Hoc Wireless Networks
– In this paper, we present a new collision-free MAC protocol–Carrier Sense Media Access with ID Countdown (CSMA/IC) for ad hoc wireless networks that can achieve 100% collisio...
Tiantong You, Chi-Hsiang Yeh, Hossam S. Hassanein
112
Voted
EUC
2006
Springer
15 years 7 months ago
Formulas and Protocols for Broadcasting in Mobile Ad Hoc Networks
An operation is called broadcasting if a node sends a packet to all other nodes in an ad hoc network. Broadcasting is an elementary operation to support many applications in ad hoc...
Chang Wu Yu, Cheng Yao Tseng
130
Voted
IANDC
2008
128views more  IANDC 2008»
15 years 3 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...