Sciweavers

7329 search results - page 211 / 1466
» Network Extractor Protocols
Sort
View
142
Voted
APNOMS
2007
Springer
15 years 10 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
126
Voted
WSNA
2003
ACM
15 years 9 months ago
Fast authenticated key establishment protocols for self-organizing sensor networks
In this paper, we consider efficient authenticated key This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in...
Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bed...
129
Voted
STOC
1998
ACM
96views Algorithms» more  STOC 1998»
15 years 8 months ago
Randomized Protocols for Low Congestion Circuit Routing in Multistage Interconnection Networks
In this paper we study randomized algorithms for circuit switching on multistage networks related to the butterfly. We devise algorithms that route messages by constructing circu...
Richard Cole, Bruce M. Maggs, Friedhelm Meyer auf ...
148
Voted
IPPS
2003
IEEE
15 years 9 months ago
An Extended Link Reversal Protocol in Dynamic Networks
— We consider the problem of maintaining routing paths between nodes in a dynamic network. Gafni and Bertsekas proposed a link reversal approach called the BG method that maintai...
Jie Wu, Fei Dai
132
Voted
INFOCOM
1998
IEEE
15 years 8 months ago
A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks
In order to support quality-of-service (QoS) for real-time data communications such as voice, video and interactive services, multiaccess networks must provide an effective priorit...
Mark D. Corner, Nada Golmie, Jörg Liebeherr, ...