Sciweavers

2500 search results - page 155 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
140
Voted
SP
2008
IEEE
15 years 3 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
ICDCS
2008
IEEE
15 years 10 months ago
Utility-Based Opportunistic Routing in Multi-Hop Wireless Networks
—Recently, opportunistic routing (OR) has been widely used to compensate for the low packet delivery ratio of multi-hop wireless networks. Previous works either provide heuristic...
Jie Wu, Mingming Lu, Feng Li
128
Voted
VTC
2007
IEEE
141views Communications» more  VTC 2007»
15 years 9 months ago
Priority Based Inter-Vehicle Communication in Vehicular Ad-Hoc Networks using IEEE 802.11e
—In this paper, we study the use of IEEE 802.11e for priority based safety messaging for Inter-Vehicle Communications (IVC) in Vehicular Ad-Hoc Networks (VANET). The message prio...
Chakkaphong Suthaputchakun, Aura Ganz
131
Voted
RTAS
2003
IEEE
15 years 8 months ago
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network
This paper presents a novel approach for calculating a probabilistic worst-case response-time for messages in the Controller Area Network (CAN). CAN uses a bit-stuffing mechanism...
Thomas Nolte, Hans Hansson, Christer Norström
CORR
2006
Springer
95views Education» more  CORR 2006»
15 years 3 months ago
Peer-to-Peer Communication Across Network Address Translators
Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP addre...
Bryan Ford, Pyda Srisuresh, Dan Kegel