Sciweavers

2200 search results - page 67 / 440
» Hop Integrity in Computer Networks
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
The interleaved authentication for filtering false reports in multipath routing based sensor networks
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor ne...
Youtao Zhang, Jim Yang, Hai T. Vu
CCGRID
2010
IEEE
13 years 8 months ago
Dynamic TTL-Based Search in Unstructured Peer-to-Peer Networks
Abstract--Resource discovery is a challenging issue in unstructured peer-to-peer networks. Blind search approaches, including flooding and random walks, are the two typical algorit...
Imen Filali, Fabrice Huet
DCOSS
2010
Springer
13 years 11 months ago
Data Spider: A Resilient Mobile Basestation Protocol for Efficient Data Collection in Wireless Sensor Networks
Traditional deployments of wireless sensor networks (WSNs) rely on static basestations to collect data. For applications with highly spatio-temporal and dynamic data generation, su...
Onur Soysal, Murat Demirbas
PDCAT
2007
Springer
14 years 1 months ago
Optimal Routing in Binomial Graph Networks
A circulant graph with n nodes and jumps j1, j2, ..., jm is a graph in which each node i, 0 ≤ i ≤ n−1, is adjacent to all the vertices i±jk mod n, where 1 ≤ k ≤ m. A bi...
Thara Angskun, George Bosilca, Bradley T. Vander Z...
ADHOC
2011
13 years 2 months ago
Design and analysis of a propagation delay tolerant ALOHA protocol for underwater networks
Acoustic underwater wireless sensor networks (UWSN) have recently gained attention as a topic of research. Such networks are characterized by increased uncertainty in medium acces...
Joon Ahn, Affan A. Syed, Bhaskar Krishnamachari, J...