Sciweavers

2699 search results - page 392 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
MOBIHOC
2004
ACM
14 years 9 months ago
A scalable approach for reliable downstream data delivery in wireless sensor networks
There exist several applications of sensor networks where reliability of data delivery can be critical. While the redundancy inherent in a sensor network might increase the degree...
Seung-Jong Park, Ramanuja Vedantham, Raghupathy Si...
ICNP
2009
IEEE
14 years 4 months ago
Multipath load-adaptive routing: putting the emphasis on robustness and simplicity
— We propose a routing and load-balancing approach with the primary goal of being robust to sudden topological changes and significant traffic matrix variations. The proposed m...
Amund Kvalbein, Constantine Dovrolis, Chidambaram ...
ICDCS
2007
IEEE
14 years 4 months ago
AVMON: Optimal and Scalable Discovery of Consistent Availability Monitoring Overlays for Distributed Systems
This paper addresses the problem of selection and discovery of a consistent availability monitoring overlay for computer hosts in a large-scale distributed application, where host...
Ramsés Morales, Indranil Gupta
PAM
2007
Springer
14 years 4 months ago
TCP over CDMA2000 Networks: A Cross-Layer Measurement Study
Modern cellular channels in 3G networks incorporate sophisticated power control and dynamic rate adaptation which can have a significant impact on adaptive transport layer protoco...
Karim Mattar, Ashwin Sridharan, Hui Zang, Ibrahim ...
ICDE
2006
IEEE
185views Database» more  ICDE 2006»
14 years 4 months ago
Don't be a Pessimist: Use Snapshot based Concurrency Control for XML
Currently, only few XML data management systems support concurrent access to an XML document, and if they do, they typically apply variations of hierarchical locking to handle XML...
Zeeshan Sardar, Bettina Kemme