Sciweavers

7329 search results - page 321 / 1466
» Network Extractor Protocols
Sort
View
CCIA
2009
Springer
15 years 5 months ago
2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario
Abstract. In this paper, we review our Multi-Agent System (MAS) architecture (2LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS...
Jordi Campos Miralles, Maite López-Sá...
ICNP
2009
IEEE
15 years 2 months ago
A Mismatch Controller for Implementing High-Speed Rate-based Transport Protocols
End-to-end rate-based congestion control algorithms are advocated for audio/video transport over the Internet instead of window-based protocols. Once the congestion controller has ...
Luca De Cicco, Saverio Mascolo
MOBIHOC
2008
ACM
16 years 4 months ago
On the need for bidirectional coupling of road traffic microsimulation and network simulation
Simulation of network protocol behavior in Vehicular Ad Hoc Network (VANET) scenarios is strongly demanded for evaluating the applicability of developed network protocols. In this...
Christoph Sommer, Zheng Yao, Reinhard German, Falk...
AINA
2008
IEEE
15 years 11 months ago
Geographical Routing in Intermittently Connected Ad Hoc Networks
In intermittently connected ad hoc networks standard routing protocols like AODV, DSR and GPSR fail since they generally cannot find a contemporaneous path from source to destinat...
Erik Kuiper, Simin Nadjm-Tehrani
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 11 months ago
An Architecture for Network Layer Privacy
— We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdropper...
Marcelo Bagnulo, Alberto García-Martí...