Sciweavers

198 search results - page 34 / 40
» A Comparison of Reliable Multicast Protocols
Sort
View
ICDCS
2002
IEEE
14 years 12 days ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
IAT
2003
IEEE
14 years 22 days ago
A JMS Message Transport Protocol for the JADE Platform
A prerequisite of joining an enterprise system is the ability to cope with the rigorous demands experienced within such systems. One of the most fundamental of these demands is th...
Edward Curry, Desmond Chambers, Gerard Lyons
ADHOC
2007
139views more  ADHOC 2007»
13 years 7 months ago
Bounded-distance multi-clusterhead formation in wireless ad hoc networks
We present a clustering technique addressing redundancy for bounded-distance clusters, which means being able to determine the minimum number of cluster-heads per node, and the ma...
Marco Aurélio Spohn, J. J. Garcia-Luna-Acev...
ICDCSW
2009
IEEE
14 years 2 months ago
Performance Tradeoffs Among Percolation-Based Broadcast Protocols in Wireless Sensor Networks
Broadcast of information in wireless sensor networks is an important operation, e.g., for code updates, queries, membership information, etc. In this paper, we analyze and experim...
Vijay Raman, Indranil Gupta
WISEC
2009
ACM
14 years 2 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel