Sciweavers

2497 search results - page 17 / 500
» Requirements for models of achievable routing
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 7 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ICNP
2005
IEEE
15 years 7 months ago
Path Vector Face Routing: Geographic Routing with Local Face Information
Existing geographic routing algorithms depend on the planarization of the network connectivity graph for correctness, and the planarization process gives rise to a welldefined no...
Ben Leong, Sayan Mitra, Barbara Liskov
ANSS
2008
IEEE
15 years 8 months ago
Executable Protocol Models as a Requirements Engineering Tool
Functional prototypes and simulations are a well recognised and valued tool for building a shared understanding of requirements between users and developers. However, the developm...
Ashley T. McNeile, Ella E. Roubtsova
100
Voted
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 7 months ago
Off-network Control for Scalable Routing in Very Large Sensor Networks
—This paper presents an architectural solution to address the problem of scalable routing in very large sensor networks. The control complexities of the existing sensor routing p...
Tao Wu, Subir K. Biswas
ISCC
2006
IEEE
190views Communications» more  ISCC 2006»
15 years 7 months ago
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...