Sciweavers

61 search results - page 11 / 13
» A Reliable Subcasting Protocol for Wireless Environments
Sort
View
IPSN
2010
Springer
15 years 10 months ago
KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment
Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs ...
Raimondas Sasnauskas, Olaf Landsiedel, Muhammad Ha...
SIGCOMM
2006
ACM
15 years 9 months ago
Virtual ring routing: network routing inspired by DHTs
This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in D...
Matthew Caesar, Miguel Castro, Edmund B. Nightinga...
ICOIN
2007
Springer
15 years 10 months ago
On the Use of Manchester Violation Test in Detecting Collision
Smart devices in the ubiquitous computing environment implement service/device discovery protocol that helps discovering each other and the services provided. As client device may ...
Yee-Loo Foo, Hiroyuki Morikawa
VTC
2010
IEEE
162views Communications» more  VTC 2010»
15 years 2 months ago
Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications
—The IEEE 1609.4 standard has been proposed to provide multi-channel operations in wireless access for vehicular environments (WAVE), where all the channels are periodically sync...
Jui-Hung Chu, Kai-Ten Feng, Chen-Nee Chuah, Chin-F...
SASN
2003
ACM
15 years 9 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...