Sciweavers

382 search results - page 45 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 8 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
TWC
2008
141views more  TWC 2008»
15 years 1 months ago
Progressive Accumulative Routing: Fundamental Concepts and Protocol
This paper considers a multi-hop network in which relay nodes cooperate to minimize the total energy consumed in transmitting a (unicast) packet from a source to a destination. We...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch,...
120
Voted
INFOCOM
2010
IEEE
15 years 4 days ago
ACR: Active Collision Recovery in Dense Wireless Sensor Networks
Abstract—Packet collision causes packet loss and wastes resources in wireless networks. It becomes even worse in dense WSNs, due to burst-traffic and congestion around sinks. In...
Yafeng Wu, Gang Zhou, John A. Stankovic
BROADNETS
2007
IEEE
15 years 5 months ago
Energy-efficient transmission for multimedia streams in last-hop wireless internet
Multimedia applications have unique characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss tolerance and strict timing requirem...
Albert F. Harris III, Robin Snader, Robin Kravets
CORR
2010
Springer
154views Education» more  CORR 2010»
15 years 1 months ago
Cross Layer Aware Adaptive MAC based on Knowledge Based Reasoning for Cognitive Radio Computer Networks
: In this paper we are proposing a new concept in MAC layer protocol design for Cognitive radio by combining information held by physical layer and MAC layer with analytical engine...
Vibhar Pathak, Krishna Chandra Roy, Santosh Kumar ...