Sciweavers

1498 search results - page 58 / 300
» Collection tree protocol
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 8 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
ICMCS
2006
IEEE
192views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Low Latency Video Streaming Over Peer-To-Peer Networks
We study peer-to-peer multicast streaming, where a source distributes real-time video to a large population of hosts by making use of their forwarding capacity rather than relying...
Eric Setton, Jeonghun Noh, Bernd Girod
CORR
2007
Springer
74views Education» more  CORR 2007»
13 years 10 months ago
Parity Forwarding for Multiple-Relay Networks
—This paper proposes a relaying strategy for the multiple-relay network in which each relay decodes a selection of transmitted messages by other transmitting terminals, and forwa...
Peyman Razaghi, Wei Yu
ICPPW
1999
IEEE
14 years 2 months ago
An On-Demand Shared Tree with Hybrid State for Multicast Routing in Ad Hoc Mobile Wireless Networks
This paper describes the Multicast Shared Tree Protocol MSTP that has been designed to support the delivery of multicast packets in a mobile ad hoc network. MSTP uses a shared tre...
Elena Pagani, Gian Paolo Rossi
WOWMOM
2005
ACM
138views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc Networks
Current ad hoc multicast routing protocols have been designed to build and maintain a tree or mesh in the face of a mobile environment, with fast reaction to network changes in or...
Manoj Pandey, Daniel Zappala