Sciweavers

7329 search results - page 56 / 1466
» Network Extractor Protocols
Sort
View
ICCCN
2007
IEEE
15 years 6 months ago
A Bio-Inspired Robust Routing Protocol for Mobile Ad Hoc Networks
—In this paper we discuss robustness issues of a biologically inspired routing protocol for mobile ad hoc networks and the influence it has on the Quality of Service (QoS) in th...
Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata
CONEXT
2008
ACM
15 years 1 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
AINA
2007
IEEE
15 years 6 months ago
Trusted Gossip: A Rumor Resistant Dissemination Mechanism for Peer-to-Peer Information Sharing
Epidemic protocols such as gossip have proven to have many desirable properties for information sharing. However, trust is one of the issues that is yet to be examined with respec...
Arindam Mitra, Muthucumaru Maheswaran
ICNP
1996
IEEE
15 years 4 months ago
A Comparison of Known Classes of Reliable Multicast Protocols
We analyze the maximum throughput that the known classes of reliable multicast protocols can attain. A new taxonomy of reliable multicast protocols is introduced based on the prem...
Brian Neil Levine, J. J. Garcia-Luna-Aceves
INFOCOM
2008
IEEE
15 years 6 months ago
Border Effects, Fairness, and Phase Transition in Large Wireless Networks
—We characterize the fairness of decentralized medium access control protocols based on CSMA/CA, such as IEEE 802.11, in large multi-hop wireless networks. In particular, we show...
Mathilde Durvy, Olivier Dousse, Patrick Thiran