Sciweavers

3972 search results - page 195 / 795
» Design of the iSCSI Protocol
Sort
View
PEWASUN
2004
ACM
15 years 10 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
RAID
2004
Springer
15 years 10 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
DATE
2003
IEEE
104views Hardware» more  DATE 2003»
15 years 9 months ago
Efficient Field Processing Cores in an Innovative Protocol Processor System-on-Chip
We present an innovative protocol processor component that combines wire-speed processing for low-level, and best effort processing for higher-level protocols. The component is a ...
George Lykakis, N. Mouratidis, Kyriakos Vlachos, N...
HICSS
2003
IEEE
167views Biometrics» more  HICSS 2003»
15 years 9 months ago
An Adaptive QoS Routing Protocol with Dispersity for Ad-hoc Networks
In this paper, we present the design and simulation of a bandwidth constrained multiple path on-demand routing protocol for ad-hoc networks to support end-to-end Quality of Servic...
Youngki Hwang, Pramod Varshney
123
Voted
ICNP
2002
IEEE
15 years 9 months ago
pTCP: An End-to-End Transport Layer Protocol for Striped Connections
The TCP transport layer protocol is designed for connections that traverse a single path between the sender and receiver. However, there are several environments in which multiple...
Hung-Yun Hsieh, Raghupathy Sivakumar