Sciweavers

7329 search results - page 80 / 1466
» Network Extractor Protocols
Sort
View
WS
2005
ACM
15 years 8 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...
WCNC
2010
IEEE
15 years 6 months ago
Throughput Analysis for Cooperation in Random Access Networks
—This paper aims at answering the questions of how to enable cooperative communications in random access networks. And, since cooperation introduces extra transmissions in the ch...
Amr El-Sherif, K. J. Ray Liu
123
Voted
PERCOM
2005
ACM
16 years 2 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
IMC
2004
ACM
15 years 8 months ago
Measuring interactions between transport protocols and middleboxes
In this paper we explore the current network environment with respect to how the network’s evolution ultimately impacts end-to-end protocols. The traditional end-to-end assumpti...
Alberto Medina, Mark Allman, Sally Floyd
128
Voted
ICDCS
2008
IEEE
15 years 9 months ago
Optimized Multipath Network Coding in Lossy Wireless Networks
Network coding has been a prominent approach to a series of problems that used to be considered intractable with traditional transmission paradigms. Recent work on network coding ...
Xinyu Zhang, Baochun Li