Sciweavers

4305 search results - page 773 / 861
» Analysing Protocol Implementations
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
15 years 2 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
AIEDU
2007
108views more  AIEDU 2007»
15 years 2 months ago
Explicit Reflection in Prolog-Tutor
This paper describes a reflection-based approach for open learner modeling (OLM). Tutoring dialogues are used by learners to explicitly reveal their own knowledge state to themselv...
Joséphine M. P. Tchétagni, Roger Nka...
BMCBI
2010
120views more  BMCBI 2010»
15 years 2 months ago
Optimal contact definition for reconstruction of Contact Maps
Background: Contact maps have been extensively used as a simplified representation of protein structures. They capture most important features of a protein's fold, being pref...
Jose M. Duarte, Rajagopal Sathyapriya, Henning Ste...
CCR
2008
75views more  CCR 2008»
15 years 2 months ago
Removing exponential backoff from TCP
The well-accepted wisdom is that TCP's exponential backoff mechanism, introduced by Jacobson 20 years ago, is essential for preserving the stability of the Internet. In this ...
Amit Mondal, Aleksandar Kuzmanovic
CORR
2010
Springer
183views Education» more  CORR 2010»
15 years 2 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...