Sciweavers

7329 search results - page 95 / 1466
» Network Extractor Protocols
Sort
View
PERCOM
2010
ACM
15 years 1 months ago
Architecture and protocols for the Internet of Things: A case study
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...
ICC
2007
IEEE
220views Communications» more  ICC 2007»
15 years 9 months ago
Broadcasting Protocols for Multi-Radio Multi-Channel and Multi-Rate Mesh Networks
— A vast amount of broadcasting protocols has been developed for wireless ad hoc networks. To the best of our knowledge, however, these protocols assume a single-radio singlechan...
Min Song, Jun Wang, Qun Hao
SAC
2005
ACM
15 years 8 months ago
An adaptive TDMA slot assignment protocol in ad hoc sensor networks
Due to its ability to provide collision-free packet transmission regardless of the traffic load, TDMA (Time Division Multiple Access) has been applied in ad hoc sensor networks. W...
Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio
WDAG
2004
Springer
144views Algorithms» more  WDAG 2004»
15 years 8 months ago
Contention-Free MAC Protocols for Wireless Sensor Networks
Abstract. A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and c...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 4 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol