Sciweavers

1660 search results - page 134 / 332
» Forwarding in a content-based network
Sort
View
141
Voted
PERCOM
2005
ACM
16 years 4 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
124
Voted
ICC
2009
IEEE
148views Communications» more  ICC 2009»
15 years 11 months ago
Analysis of Probabilistic Flooding: How Do We Choose the Right Coin?
Abstract—This paper studies probabilistic information dissemination in random networks. Consider the following scenario: A node intends to deliver a message to all other nodes in...
Sérgio Crisóstomo, Udo Schilcher, Ch...
154
Voted
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 11 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
129
Voted
ICNP
2007
IEEE
15 years 11 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
MUE
2007
IEEE
132views Multimedia» more  MUE 2007»
15 years 10 months ago
An Energy Efficient Broadcasting Recovering Mechanism Based On ZBP
Wireless Sensor Networks (WSNs) have been widely used in environment monitoring to collect useful information. Packet broadcasting is an essential function for establishing a comm...
Xiao-Yi Lu, Zhen Fu, In-Sook Lee, Myong-Soon Park