Sciweavers

7329 search results - page 239 / 1466
» Network Extractor Protocols
Sort
View
MOBIHOC
2002
ACM
16 years 3 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp
NSDI
2008
15 years 6 months ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
MSWIM
2006
ACM
15 years 10 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
AINA
2004
IEEE
15 years 7 months ago
An Enhanced Gnutella P2P Protocol: A Search Perspective
Although Gnutella is the most popular Peer-to-Peer protocol for file sharing, drawbacks are often found in searching and locating files. They include that (1) a limited number of ...
Sai Ho Kwok, K. Y. Chan
107
Voted
NSDI
2008
15 years 6 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner