Sciweavers

3972 search results - page 53 / 795
» Design of the iSCSI Protocol
Sort
View
ADHOC
2008
69views more  ADHOC 2008»
13 years 9 months ago
Design and evaluation of network reconfiguration protocols for mostly-off sensor networks
Yuan Li, Wei Ye, John S. Heidemann, Rohit Kulkarni
IJSN
2007
120views more  IJSN 2007»
13 years 9 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
WINET
2008
94views more  WINET 2008»
13 years 8 months ago
Transmission costs, selfish nodes, and protocol design
We study how selfish nodes react to transmission costs in wireless networks. Intuitively, it seems that transmission costs should have a stabilizing effect as (rational) nodes will...
Peter Marbach
CI
2004
95views more  CI 2004»
13 years 8 months ago
Automated Design of Security Protocols
Hao Chen, John A. Clark, Jeremy L. Jacob