Sciweavers

422 search results - page 18 / 85
» Protocol Specialization
Sort
View
91
Voted
ICPADS
2007
IEEE
15 years 8 months ago
A semantic overlay network for unstructured peer-to-peer protocols
Peer-to-Peer computing has become a popular networking paradigm for file sharing, distributed computing, collaborative working, etc. The widely used unstructured Peer-to-Peer pro...
Junfeng Xie, Zhenhua Li, Guihai Chen
SSS
2005
Springer
119views Control Systems» more  SSS 2005»
15 years 7 months ago
Self-stabilization of Byzantine Protocols
Awareness of the need for robustness in distributed systems increases as distributed systems become integral parts of day-to-day systems. Self-stabilizing while tolerating ongoing ...
Ariel Daliot, Danny Dolev
JNW
2007
89views more  JNW 2007»
15 years 1 months ago
Traffic Aware Power Saving Protocol in Multi-hop Mobile Ad-Hoc Networks
— This paper presents an optimization of PSM to improve its energy conservation. According to PSM, time is divided into beacon intervals. At the beginning of each beacon interval...
Abdelfattah Belghith, Wafa Akkari, Jean-Marie Bonn...
IWFM
2003
15 years 3 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
VTC
2007
IEEE
114views Communications» more  VTC 2007»
15 years 8 months ago
Advanced Disjoint Address Allocation for Mobile Ad Hoc Networks
—Regarding to address allocation, a mobile ad hoc network (MANET) may suffer from the lack of address and network partition/merging due to mobility of nodes. In this paper, we pr...
Jinkyu Lee, Sehoon Kim, Ikjun Yeom