Sciweavers

258 search results - page 40 / 52
» Non-cooperative routing in loss networks
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
STOC
2003
ACM
99views Algorithms» more  STOC 2003»
14 years 8 months ago
On the fractal behavior of TCP
We propose a natural, mathematically tractable model of TCP which captures both its additive-increase, multiplicative-decrease behavior and its feedback mechanism. Neither a fluid...
Anna C. Gilbert, Howard J. Karloff
ICDCN
2010
Springer
14 years 2 months ago
Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks
Conventional wireless networks employ a contention based channel access mechanism, which not only imposes high latency but also reduces goodput of the network. Lack of interference...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...
ICON
2007
IEEE
14 years 2 months ago
A Light-Weight Client Mobility Approach for Infrastructure Mesh Networks
— Infrastructure mesh networks offer a high-capacity wireless backhaul network through which client devices, such as PDAs, can connect to one another or with external networks. T...
Ryan Wishart, Asad Amir Pirzada, Marius Portmann
ICC
2007
IEEE
14 years 2 months ago
Performance Analysis of SINEMO: Seamless IP-Diversity Based Network Mobility
Abstract— IETF has proposed Mobile IPv6-based Network Mobility (NEMO) basic support protocol (BSP) to support network mobility. NEMO BSP inherits all the drawbacks of Mobile IPv6...
Pulak K. Chowdhury, Abu S. Reaz, Mohammed Atiquzza...