Sciweavers

5324 search results - page 1012 / 1065
» Internet Security Protocols
Sort
View
JCP
2006
157views more  JCP 2006»
13 years 7 months ago
An Infrastructure for Service Oriented Sensor Networks
Emerging wireless technologies enable ubiquitous access to networked services. Integration of wireless technologies into sensor and actuator nodes provides the means for remote acc...
Åke Östmark, Jens Eliasson, Per Lindgre...
ADHOC
2005
176views more  ADHOC 2005»
13 years 7 months ago
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
The Internet has become ubiquitous and there has been tremendous growth in wireless communications in recent years. Many wireless communication techniques are commercially availab...
Tin Yu Wu, Ching-Yang Huang, Han-Chieh Chao
JSAC
2010
131views more  JSAC 2010»
13 years 6 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
TON
2010
165views more  TON 2010»
13 years 6 months ago
An analytic throughput model for TCP NewReno
—This paper develops a simple and accurate stochastic model for the steady-state throughput of a TCP NewReno bulk data transfer as a function of round-trip time and loss rate. Ou...
Nadim Parvez, Anirban Mahanti, Carey L. Williamson
IMC
2010
ACM
13 years 5 months ago
Measurement and analysis of real-world 802.11 mesh networks
Despite many years of work in wireless mesh networks built using 802.11 radios, the performance and behavior of these networks in the wild is not well-understood. This lack of und...
Katrina LaCurts, Hari Balakrishnan
« Prev « First page 1012 / 1065 Last » Next »