Sciweavers

369 search results - page 36 / 74
» A High Performance Totally Ordered Multicast Protocol
Sort
View
VTC
2007
IEEE
115views Communications» more  VTC 2007»
14 years 2 months ago
The DYMO Routing Protocol in VANET Scenarios
—Coupling Vehicular Ad Hoc Networks (VANETs) with wired networks such as the Internet via access points creates a difficult mix of highly mobile nodes and a static infrastructur...
Christoph Sommer, Falko Dressler
IPPS
1999
IEEE
14 years 4 days ago
Low-Latency Message Passing on Workstation Clusters using SCRAMNet
Clusters of workstations have emerged as a popular platform for parallel and distributed computing. Commodity high speed networks which are used to connect workstation clusters pr...
Vijay Moorthy, Matthew G. Jacunski, Manoj Pillai, ...
GLOBECOM
2008
IEEE
14 years 2 months ago
Throughput Analysis of Wireless Relay Slotted ALOHA Systems with Network Coding
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
Daisuke Umehara, Tomoya Hirano, Satoshi Denno, Mas...
SIGCOMM
2009
ACM
14 years 2 months ago
SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks
Network protocol designers, both at the physical and network level, have long considered interference and simultaneous transmission in wireless protocols as a problem to be avoide...
Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. ...
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...