Sciweavers

7329 search results - page 208 / 1466
» Network Extractor Protocols
Sort
View
136
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks
— We propose a contention based reservation MAC protocol for a collaborative sensing scenario involving a set of surveillance UAVs communicating with a hub. Data transmission rig...
Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis
109
Voted
FOSSACS
2004
Springer
15 years 9 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
154
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
123
Voted
BROADNETS
2004
IEEE
15 years 7 months ago
MOAR: A Multi-Channel Opportunistic Auto-Rate Media Access Protocol for Ad Hoc Networks
The IEEE 802.11 wireless media standard supports multiple frequency channels as well as multiple data rates at the physical (PHY) layer. Moreover, various auto rate adaptation mec...
Vikram Kanodia, Ashutosh Sabharwal, Edward W. Knig...
111
Voted
CCGRID
2004
IEEE
15 years 7 months ago
HTTP(P2P): a transaction based (HTTP) peer-to-peer protocol for the dissemination of Web-objects in congested networks
Highly popular websites can suffer classical congestion collapse because of the ability of outgoing `bursty' data to congest the server side link. Using the well known and re...
R. L. R. Mattson, S. Ghosh