Sciweavers

7329 search results - page 238 / 1466
» Network Extractor Protocols
Sort
View
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 10 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
142
Voted
JSAC
2006
100views more  JSAC 2006»
15 years 3 months ago
Measuring and Improving the Performance of Network Mobility Management in IPv6 Networks
Measuring the performance of an implementation of a set of protocols and analyzing the results is crucial to understanding the performance and limitations of the protocols in a rea...
Henrik Petander, Eranga Perera, Kun-Chan Lan, Arun...
AINA
2007
IEEE
15 years 8 months ago
A Certified Email Protocol Using Key Chains
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients, that relies on key chains to considerably reduce the storage requirements of t...
Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mau...
SRDS
1991
IEEE
15 years 7 months ago
A Fault-Tolerant, Scalable, Low-Overhead Distributed Garbage Detection Protocol
We present a protocol for the distributed detection of garbage in a distributed system subject to common failures such as lost and duplicated messages, network partition, dismount...
Marc Shapiro