Sciweavers

7329 search results - page 27 / 1466
» Network Extractor Protocols
Sort
View
IPSN
2011
Springer
13 years 1 months ago
Demo abstract: Radio-diversity collection tree protocol
Wen Hu, Brano Kusy, Christian Richter, Michael Br&...
PEWASUN
2004
ACM
14 years 3 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
AINA
2007
IEEE
14 years 4 months ago
Recovery Protocols for Replicated Databases - A Survey
The main goal of replication is to increase dependability. Recovery protocols are a critical building block for realizing this goal. In this survey, we present an analysis of reco...
Luis H. García-Muñoz, José En...
ICNP
2005
IEEE
14 years 3 months ago
A Family of Collusion Resistant Protocols for Instantiating Security
In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and t...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
BROADNETS
2007
IEEE
14 years 4 months ago
DIMPLE: DynamIc Membership ProtocoL for epidemic protocols
—Epidemic protocols assume that information of a random set of nodes is provided at each protocol round. By definition, the random set needs to be chosen uniformly and randomly ...
Jin Sun, Paul J. Weber, Byung Kyu Choi, Roger M. K...