Sciweavers

4305 search results - page 288 / 861
» Analysing Protocol Implementations
Sort
View
116
Voted
SAC
2009
ACM
15 years 9 months ago
Geographical data collection in sensor networks with self-organizing transaction cluster-heads
This paper proposes 2G, a flexible and energy-efficient data collection protocol for sensor networks for increasing network lifetime. To this end, it integrates self-organizing d...
Neeraj Rajgure, Eric Platon, Cristian Borcea, Shin...
GLOBECOM
2009
IEEE
15 years 9 months ago
From Trees to DAGs: Improving the Performance of Bridged Ethernet Networks
—Ethernet is widely used in Local Area Networks (LANs) due to its simplicity and cost effectiveness. Today, a great deal of effort is being devoted to extending Ethernet capabili...
Chen Avin, Ran Giladi, Nissan Lev-Tov, Zvi Lotker
FSTTCS
2009
Springer
15 years 9 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
160
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 9 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
116
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts
— A large number of overlay protocols have been developed, almost all of which assume each host has two-way communication capability. However, this does not hold as the deploymen...
Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, X...