Sciweavers

7329 search results - page 255 / 1466
» Network Extractor Protocols
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
15 years 4 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
117
Voted
ICNP
1996
IEEE
15 years 8 months ago
Time-Shift Scheduling: Fair Scheduling of Flows in High Speed Networks
Abstract-- We present a scheduling protocol, called TimeShift Scheduling, to forward packets from multiple input flows to a single output channel. Each input flow is guaranteed a p...
Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas
ICC
2009
IEEE
136views Communications» more  ICC 2009»
15 years 10 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
ICC
2007
IEEE
155views Communications» more  ICC 2007»
15 years 10 months ago
On Supporting Robust Voice Multicasting Over Ad Hoc Wireless Networks
Abstract— In this paper, we address the problem of voice multicasting in ad hoc wireless networks. The unique characteristics of voice traffic (viz. small packet size, high pack...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
BROADNETS
2006
IEEE
15 years 10 months ago
Performance Analysis of Soft-State Lightpath Management in GMPLS-Based WDM Networks
RSVP–TE is a signaling protocol to setup and teardown lightpaths in wavelength–routed GPMLS networks. RSVP– TE uses the soft–state control mechanism to manage lightpaths. ...
Shinya Ishida, Shin'ichi Arakawa, Masayuki Murata