Sciweavers

1573 search results - page 110 / 315
» Reliable Communication in Overlay Networks
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 9 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 4 months ago
VoIP Performance in SIP-Based Vertical Handovers Between WLAN and GPRS/UMTS Networks
—This paper experimentally analyzes the handover performance of VoIP sessions in a wireless overlay of 802.11 WLANs and GPRS/UMTS networks when mobility is handled at the applica...
Marc Cardenete-Suriol, Josep Mangues-Bafalluy, Mar...
IPPS
2006
IEEE
15 years 4 months ago
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomnes...
A. Brodie, Cheng-Zhong Xu, Weisong Shi
VTC
2006
IEEE
113views Communications» more  VTC 2006»
15 years 3 months ago
Implementation of a Multihoming Agent for Mobile On-board Communication
— A research topic that is becoming increasingly popular is that of on-board mobile communication, where users on a vehicle are connected to a local network that attaches to the ...
Jun Yao, Yi Duan, Jianyu Pan, Kun-Chan Lan
ICCNMC
2005
Springer
15 years 3 months ago
Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks
This paper proposes a set of novel multicast algorithms for m-D mesh overlay networks that can achieve shorter multicast delay and less resource consumptions. In contrast to previo...
Weijia Jia, Wanqing Tu, Jie Wu