Sciweavers

7329 search results - page 203 / 1466
» Network Extractor Protocols
Sort
View
135
Voted
CSFW
2009
IEEE
15 years 10 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
132
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 10 months ago
Performance Analysis of a Network-Based Protocol for Localized IP Mobility Management
— In this paper a new protocol for IP mobility management is described, which follows a network-based approach and fulfils the requirements of optimized usage of radio spectrum a...
Ivano Guardini, Gerardo Giaretta, Francesco Miconi
154
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks
— Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In ...
Jianfeng Wang, Yuguang Fang, Dapeng Oliver Wu
206
Voted
MASS
2010
353views Communications» more  MASS 2010»
14 years 10 months ago
Trailing mobile sinks: A proactive data reporting protocol for Wireless Sensor Networks
In Wireless Sensor Networks (WSN), data gathering using mobile sinks typically incurs constant propagation of sink location indication messages to guide the direction of data repor...
Xinxin Liu, Han Zhao, Xin Yang, Xiaolin Li, Ning W...
114
Voted
AINA
2009
IEEE
15 years 10 months ago
Improving Opportunistic Data Dissemination via Known Vector
An opportunistic network is a network where each node only has connectiviy with other nodes opportunistically. To disseminate data in this kind of network is a challenging task an...
Jyh-How Huang, Ying-Yu Chen, Yi-Chao Chen, Shivaka...