Sciweavers

7329 search results - page 46 / 1466
» Network Extractor Protocols
Sort
View
AINA
2006
IEEE
14 years 4 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
ICNS
2006
IEEE
14 years 4 months ago
MojaveComm: A Robust Group Communication Library for Grid Environments
This paper introduces a fault-tolerant group communication protocol that is aimed at grid and wide area environments. The protocol has two layers. The lower layer provides a total...
Cristian Tapus, David A. Noblet, Jason Hickey
HIPC
2005
Springer
14 years 3 months ago
Snap-Stabilizing Detection of Cutsets
A snap-stabilizing protocol, starting from any configuration, always behaves according to its specification. In this paper, we present a snap-stabilizing protocol which detects ...
Alain Cournier, Stéphane Devismes, Vincent ...
JNW
2008
108views more  JNW 2008»
13 years 10 months ago
Energy Efficient MANET Routing Using a Combination of Span and BECA/AFECA
This paper presents some novel approaches for energy efficient routing in mobile ad-hoc networks. Two known energy preserving techniques, Span and BECA/AFECA, are combined with a w...
Mads Darø Kristensen, Niels Olof Bouvin
INFOCOM
2009
IEEE
14 years 4 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang