Sciweavers

929 search results - page 158 / 186
» Modeling and Verifying Ad Hoc Routing Protocols
Sort
View
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
CISIS
2009
IEEE
14 years 2 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
WINET
2010
224views more  WINET 2010»
13 years 6 months ago
Hierarchical geographic multicast routing for wireless sensor networks
Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a fundamental routing servi...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
APCSAC
2003
IEEE
14 years 1 months ago
A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks
Static nodes, e.g. houses, educational institutions etc, can comprise ad-hoc networks using off-the-self wireless technologies with a view to bypass expensive telecommunication so...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
GLOBECOM
2007
IEEE
14 years 2 months ago
Two Energy-Saving Schemes for Cooperative Transmission with Opportunistic Large Arrays
— An opportunistic large array (OLA) is a form of cooperative diversity in which a large group of simple, inexpensive relays or forwarding nodes operate without any mutual coordi...
Lakshmi V. Thanayankizil, Aravind Kailas, Mary Ann...