Sciweavers

7329 search results - page 65 / 1466
» Network Extractor Protocols
Sort
View
BCS
2008
15 years 1 months ago
A Vision of the Next Generation Internet: A Policy Oriented Perspective
Network Architecture (PONA) and an abstract two part protocol stack with a virtualization layer in between. We also introduce the concept of generalized communication end-points
Subarthi Paul, Raj Jain, Jianli Pan, Mic Bowman
BROADNETS
2006
IEEE
15 years 6 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
BNCOD
2006
69views Database» more  BNCOD 2006»
15 years 1 months ago
Reducing Sub-transaction Aborts and Blocking Time Within Atomic Commit Protocols
Composed Web service transactions executed in distributed networks often require an atomic execution. Guaranteeing atomicity in mobile networks involves a lot more challenges than ...
Stefan Böttcher, Le Gruenwald, Sebastian Ober...
EWSN
2006
Springer
15 years 11 months ago
A Measurement-Based Analysis of the Interaction Between Network Layers in TinyOS
There have been a number of recent proposals for link and network-layer protocols in the sensor networking literature, each of which claims to be superior to other approaches. Howe...
Umberto Malesci, Samuel Madden
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...