Sciweavers

7329 search results - page 327 / 1466
» Network Extractor Protocols
Sort
View
IPCCC
2007
IEEE
15 years 11 months ago
Rerouting Time and Queueing in Proactive Ad Hoc Networks
In a MANET network where nodes move frequently, the probability of connectivity loss between nodes might be high, and communication sessions may easily loose connectivity during t...
Vinh Pham, Erlend Larsen, Knut Øvsthus, Paa...
ICMCS
2006
IEEE
192views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Low Latency Video Streaming Over Peer-To-Peer Networks
We study peer-to-peer multicast streaming, where a source distributes real-time video to a large population of hosts by making use of their forwarding capacity rather than relying...
Eric Setton, Jeonghun Noh, Bernd Girod
JSAC
2011
137views more  JSAC 2011»
14 years 7 months ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...
IJSN
2008
145views more  IJSN 2008»
15 years 4 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
142
Voted
PERCOM
2005
ACM
16 years 4 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin