Sciweavers

138 search results - page 8 / 28
» Packet forwarding with source verification
Sort
View
73
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
SourceSync: a distributed wireless architecture for exploiting sender diversity
Diversity is an intrinsic property of wireless networks. Recent years have witnessed the emergence of many distributed protocols like ExOR, MORE, SOAR, SOFT, and MIXIT that exploi...
Hariharan Rahul, Haitham Hassanieh, Dina Katabi
INFOCOM
2012
IEEE
13 years 1 days ago
Robust multi-pipeline scheduling in low-duty-cycle wireless sensor networks
—Data collection is one of the major traffic pattern in wireless sensor networks, which requires regular source nodes to send data packets to a common sink node with limited end...
Yongle Cao, Shuo Guo, Tian He
GLOBECOM
2006
IEEE
15 years 3 months ago
Adaptive Multi-Copy Routing for Intermittently Connected Mobile Ad Hoc Networks
— Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-todestination paths do not exist most of the time because of their sparse ...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
INFOCOM
2012
IEEE
13 years 1 days ago
Low-stretch greedy embedding heuristics
—Greedy embedding is a graph embedding that makes the simple greedy packet forwarding scheme successful for every source-destination pair. It is desirable that graph embeddings a...
Andrej Cvetkovski, Mark Crovella
PADS
2005
ACM
15 years 3 months ago
Simulating Realistic Packet Routing without Routing Protocols
A fundamental requirement for any network simulation environment is the realistic forwarding of packets from a source to a destination in the simulated topology. The routing decis...
George F. Riley, Dheeraj Reddy