Sciweavers

1080 search results - page 73 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
SIGCOMM
1999
ACM
15 years 2 months ago
A Readable TCP in the Prolac Protocol Language
Prolac is a new statically-typed, object-oriented language for network protocol implementation. It is designed for readability, extensibility, and real-world implementation; most ...
Eddie Kohler, M. Frans Kaashoek, David R. Montgome...
PEWASUN
2008
ACM
14 years 11 months ago
The impact of delayed topology information in proactive routing protocols for MANETS
In the design of many proactive routing protocols for MANETs, it is often assumed that topology information is disseminated instantly and error free. Exceptions include hazysighte...
Andres Medina, Stephan Bohacek
AINA
2007
IEEE
15 years 4 months ago
An Application-Driven MAC-layer Buffer Management with Active Dropping for Real-time Video Streaming in 802.16 Networks
— In this paper, we propose an application-driven MAC-layer buffer management framework based on a novel Active Dropping (AD) mechanism for real-time video streaming in IEEE 802....
James She, Fen Hou, Pin-Han Ho
SAC
2004
ACM
15 years 3 months ago
LEMP: Lightweight Efficient Multicast Protocol for video on demand
In this paper, we propose a new scalable application-layer protocol, specifically designed for data streaming applications with large client sets. This is based upon a control hie...
Panayotis E. Fouliras, Spiros Xanthos, Nikolaos Ts...
IJNSEC
2008
126views more  IJNSEC 2008»
14 years 10 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli