Sciweavers

1565 search results - page 152 / 313
» Optimizing Layered Communication Protocols
Sort
View
94
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
On the Impact of Clear Channel Assessment on MAC Performance
— Clear Channel Assessment (CCA) is an essential ingredient in wireless networks employing channel sensing as part of their medium access mechanism. While CCA itself is implement...
Iyappan Ramachandran, Sumit Roy
132
Voted
P2P
2006
IEEE
119views Communications» more  P2P 2006»
15 years 9 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
153
Voted
SASN
2006
ACM
15 years 9 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
137
Voted
SIGCOMM
2003
ACM
15 years 8 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
133
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Optimizing Route-Cache Lifetime in Ad Hoc Networks
—On-demand routing reduces the control overhead in mobile ad hoc networks, but it has the major drawback of introducing latency between route-request arrival and the determinatio...
Ben Liang, Zygmunt J. Haas