Sciweavers

571 search results - page 93 / 115
» Simulating Realistic Packet Routing without Routing Protocol...
Sort
View
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 8 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
ICC
2007
IEEE
15 years 9 months ago
A Mobility Scheme for Personal and Terminal Mobility
Abstract— An IP mobility support protocol that enables personal and terminal mobility for IP-based applications is put forward. This protocol does not require new network entitie...
Bu-Sung Lee, Teck Meng Lim, Chai Kiat Yeo, Quang V...
OSDI
2004
ACM
16 years 3 months ago
Chain Replication for Supporting High Throughput and Availability
Chain replication is a new approach to coordinating clusters of fail-stop storage servers. The approach is intended for supporting large-scale storage services that exhibit high t...
Robbert van Renesse, Fred B. Schneider
INFOCOM
2011
IEEE
14 years 6 months ago
Forwarding anomalies in Bloom filter-based multicast
Abstract—Several recently proposed multicast protocols use inpacket Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-fl...
Mikko Särelä, Christian Esteve Rothenber...
DSN
2007
IEEE
15 years 9 months ago
The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks
Many important applications in wireless mesh networks require reliable multicast communication. Previously, Forward Error Correction (FEC) techniques have been proved successful f...
Dimitrios Koutsonikolas, Y. Charlie Hu