Sciweavers

2699 search results - page 451 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
COMSUR
2006
96views more  COMSUR 2006»
13 years 7 months ago
A survey of multipoint relay based broadcast schemes in wireless ad hoc networks
Almost every routing protocol in mobile ad hoc networks (MANETs) depends on a broadcast scheme to disseminate routing information. For this reason, creating an efficient broadcast...
Ou Liang, Y. Ahmet Sekercioglu, Nallasamy Mani
CCR
2007
76views more  CCR 2007»
13 years 7 months ago
Reducing the TCP acknowledgment frequency
Delayed acknowledgments were introduced to conserve network and host resources. Further reduction of the acknowledgment frequency can be motivated in the same way. However, reduci...
Sara Landström, Lars-Åke Larzon
CN
2007
93views more  CN 2007»
13 years 7 months ago
UDT: UDP-based data transfer for high-speed wide area networks
In this paper, we summarize our work on the UDT high performance data transport protocol in the past four years. UDT was designed to effectively utilize the rapidly emerging high-...
Yunhong Gu, Robert L. Grossman
JECR
2000
114views more  JECR 2000»
13 years 7 months ago
Intelligent Agents Acting as Artificial Employees in an Electronic Market
This paper describes an agent-based electronic market system whose underlying communication and cooperation protocols establish an artificial environment with advanced features. U...
Nikos I. Karacapilidis, Pavlos Moraitis
TMC
2010
137views more  TMC 2010»
13 years 6 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani