Sciweavers

7329 search results - page 351 / 1466
» Network Extractor Protocols
Sort
View
INFOCOM
2002
IEEE
15 years 9 months ago
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Sajal K. Das, Sanjoy K. Sen, Naveen K. Kakani
ICNP
1999
IEEE
15 years 9 months ago
Policy Disputes in Path-Vector Protocols
The Border Gateway Protocol, BGP, is currently the only interdomain routing protocol employed on the Internet. As required of any interdomain protocol, BGP allows policy-based met...
Timothy Griffin, F. Bruce Shepherd, Gordon T. Wilf...
AINA
2004
IEEE
15 years 8 months ago
Region-based Stage Construction Protocol for Fault tolerant Execution of Mobile Agent
Fault tolerance is essential to the development of reliable mobile agent system in order to guarantee continuous execution of mobile agents. For this purpose, some previous works ...
SungJin Choi, MaengSoon Baik, HongSoo Kim, JunWeon...
PERCOM
2004
ACM
16 years 4 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
EWSN
2010
Springer
15 years 11 months ago
Making Sensornet MAC Protocols Robust against Interference
Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external i...
Carlo Alberto Boano, Thiemo Voigt, Nicolas Tsiftes...