Sciweavers

411 search results - page 44 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
INFOCOM
1998
IEEE
14 years 28 days ago
Timer Reconsideration for Enhanced RTP Scalability
RTP, the Real Time Transport Protocol, has gained widespread acceptance as the transport protocol for voice and video on the Internet. Its companion control protocol, the Real Tim...
Jonathan Rosenberg, Henning Schulzrinne
IJSNET
2006
131views more  IJSNET 2006»
13 years 8 months ago
Medium access control with mobility-adaptive mechanisms for wireless sensor networks
: Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor n...
Muneeb Ali, Zartash Afzal Uzmi
IAJIT
2010
87views more  IAJIT 2010»
13 years 7 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
SIGCOMM
2005
ACM
14 years 2 months ago
ExOR: opportunistic multi-hop routing for wireless networks
This paper describes ExOR, an integrated routing and MAC protocol that increases the throughput of large unicast transfers in multi-hop wireless networks. ExOR chooses each hop of...
Sanjit Biswas, Robert Morris
SPAA
2005
ACM
14 years 2 months ago
Constant density spanners for wireless ad-hoc networks
An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining...
Kishore Kothapalli, Christian Scheideler, Melih On...