Sciweavers

1660 search results - page 65 / 332
» Forwarding in a content-based network
Sort
View
SASN
2006
ACM
15 years 10 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
ICPP
2005
IEEE
15 years 9 months ago
A Hybrid Searching Scheme in Unstructured P2P Networks
The existing searching schemes in Peer-to-Peer (P2P) networks are either forwarding-based or non-forwarding based. In forwarding-based schemes, queries are forwarded from the quer...
Xiuqi Li, Jie Wu
SIGCOMM
1990
ACM
15 years 8 months ago
Reliable Broadband Communication Using a Burst Erasure Correcting Code
Traditionally, a transport protocol corrects errors in a computer communication network using a simple ARQ protocol. With the arrival of broadband networks, forward error correcti...
Anthony J. McAuley
VTC
2008
IEEE
147views Communications» more  VTC 2008»
15 years 10 months ago
Media Access Technique for Cluster-Based Vehicular Ad Hoc Networks
— We propose a hybrid media access technique for cluster-based vehicular networks. This technique integrates the centralization approach of cluster management and the universal w...
Zaydoun Y. Rawashdeh, Syed Masud Mahmud
ICDCS
2008
IEEE
15 years 10 months ago
On the Longest RNG Edge of Wireless Ad Hoc Networks
— Relative neighborhood graph (RNG) has been widely used in topology control and geographic routing in wireless ad hoc networks. Its maximum edge length is the minimum requiremen...
Peng-Jun Wan, Lixin Wang, F. Frances Yao, Chih-Wei...