Sciweavers

1498 search results - page 31 / 300
» Collection tree protocol
Sort
View
CNSR
2007
IEEE
158views Communications» more  CNSR 2007»
13 years 11 months ago
Bounding the Information Collection Performance of Wireless Sensor Network Routing
Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In orde...
Qinghua Wang, Tingting Zhang, Stefan Pettersson
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
ICC
2007
IEEE
140views Communications» more  ICC 2007»
14 years 4 months ago
Performance Analysis for Overlay Multicast on Tree and M-D Mesh Topologies
— Without the multicast support from the underlying networks, overlay multicast has the advantage of implementing inter-domain multicast communications. Usually, overlay multicas...
Wanqing Tu
LCN
2006
IEEE
14 years 4 months ago
An Interior Path Vector Routing Protocol
Today’s intra-domain protocols are limited in their scalability. We examine these limitations and propose an alternative in the form of an IGP based on path vectors. Taking adva...
Conor Creagh, Cormac J. Sreenan
GLOBECOM
2007
IEEE
14 years 4 months ago
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts
— A large number of overlay protocols have been developed, almost all of which assume each host has two-way communication capability. However, this does not hold as the deploymen...
Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, X...