Sciweavers

540 search results - page 17 / 108
» Utility-Based Routing in Communication Networks with Unstabl...
Sort
View
128
Voted
IPCCC
2005
IEEE
15 years 7 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
124
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
115
Voted
JNW
2006
145views more  JNW 2006»
15 years 1 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
TWC
2008
137views more  TWC 2008»
15 years 1 months ago
Reliability and route diversity in wireless networks
Abstract -We study the problem of communication reliability and diversity in multi-hop wireless networks. Our aim is to develop a new network model that better takes into account t...
Amir Ehsan Khandani, Jinane Abounadi, Eytan Modian...
109
Voted
IPPS
1998
IEEE
15 years 6 months ago
Scheduling with Communication Delays and Data Routing in Message Passing Architectures
This work deals with the scheduling problem of a directed acyclic graph with interprocessor communication delays. The objective is to minimize the makespan, taking into account the...
Aziz Moukrim, Alain Quilliot