Sciweavers

1331 search results - page 142 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
NETWORKING
2007
14 years 11 months ago
Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may ge...
Ahmad Al Hanbali, Arzad Alam Kherani, Philippe Nai...
CSFW
2007
IEEE
15 years 4 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
INFOCOM
2009
IEEE
15 years 4 months ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu
WCNC
2010
IEEE
14 years 8 months ago
Interference Modeling for Cognitive Radio Networks with Power or Contention Control
—In this paper, we present an interference model for cognitive radio (CR) networks employing power control or contention control scheme. The probability density functions (PDFs) ...
Zengmao Chen, Cheng-Xiang Wang, Xuemin Hong, John ...
INFOCOM
2005
IEEE
15 years 3 months ago
The impact of imperfect scheduling on cross-layer rate control in wireless networks
— In this paper, we study cross-layer design for rate control in multihop wireless networks. In our previous work, we have developed an optimal cross-layered rate control scheme ...
Xiaojun Lin, Ness B. Shroff