Sciweavers

1573 search results - page 85 / 315
» Reliable Communication in Overlay Networks
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
NGC
2000
Springer
15 years 1 months ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
VTC
2007
IEEE
141views Communications» more  VTC 2007»
15 years 4 months ago
Priority Based Inter-Vehicle Communication in Vehicular Ad-Hoc Networks using IEEE 802.11e
—In this paper, we study the use of IEEE 802.11e for priority based safety messaging for Inter-Vehicle Communications (IVC) in Vehicular Ad-Hoc Networks (VANET). The message prio...
Chakkaphong Suthaputchakun, Aura Ganz
SP
2008
IEEE
14 years 9 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
CORR
2006
Springer
95views Education» more  CORR 2006»
14 years 10 months ago
Peer-to-Peer Communication Across Network Address Translators
Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP addre...
Bryan Ford, Pyda Srisuresh, Dan Kegel