Sciweavers

4305 search results - page 165 / 861
» Analysing Protocol Implementations
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
Capacity, Delay and Mobility in Wireless Ad-Hoc Networks
Abstract— Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been show...
Nikhil Bansal, Zhen Liu
LCN
2003
IEEE
14 years 2 months ago
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
In this paper, we introduce statistical methods to estimate the stability of paths in a mobile wireless ad hoc environment. Identifying stable paths helps to reduce control trafï¬...
Michael Gerharz, Christian de Waal, Peter Martini,...
ACISP
1998
Springer
14 years 1 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...
INFOCOM
1993
IEEE
14 years 1 months ago
Experimental Assessment of End-to-End Behavior on Internet
Over the last decade Internet has grown by orders of magnitude in size. Many of the protocols that were designed several years ago are still in use. It is not clear if the assumpt...
Dheeraj Sanghi, Ashok K. Agrawala, Olafur Gudmunds...
AINA
2004
IEEE
14 years 27 days ago
A Time and Distance - Based Multicast Algorithm for IPv6 Mobile Networks
IP multicasting has naturally been considered the ideal technique to be used with multimedia communications. Unfortunately, current multicast protocols do not consider the dynamic...
Wu-Hsiao Hsu, Bin-Hau Lee, Ming-Han Liu, Bor-Yeh S...