Sciweavers

2200 search results - page 147 / 440
» Hop Integrity in Computer Networks
Sort
View
237
Voted
ICCCN
2008
IEEE
15 years 9 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
113
Voted
CCR
2002
62views more  CCR 2002»
15 years 2 months ago
An enforced inter-admission delay performance-driven connection admission control algorithm
Connection Admission Control (CAC) is an important function in a computer network that supports Quality of Service (QoS). The function of CAC is to decide whether a new connection...
Stanislav Belenki
COMCOM
2000
95views more  COMCOM 2000»
15 years 2 months ago
Protocols and architecture for managing TCP/IP network infrastructures
With their increased power and versatility, today's computer networks are becoming used for an ever-growing number of diverse applications. Further, the networking structures...
A. King, R. Hunt
IPPS
2003
IEEE
15 years 7 months ago
Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets
In this paper we propose a novel architecture, CARD, for resource discovery in large scale MANets that may scale up to thousands of nodes. Our mechanism is suitable for resource d...
Ahmed Helmy, Saurabh Garg, Priyatham Pamu, Nitin N...
SIGCOMM
2010
ACM
15 years 2 months ago
SourceSync: a distributed wireless architecture for exploiting sender diversity
Diversity is an intrinsic property of wireless networks. Recent years have witnessed the emergence of many distributed protocols like ExOR, MORE, SOAR, SOFT, and MIXIT that exploi...
Hariharan Rahul, Haitham Hassanieh, Dina Katabi