A black hole is a harmful host that destroys incoming agents without leaving any observable trace of such a destruction. The black hole search problem is to unambiguously determine...
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
As part of the IEEE 802.16 protocol, the random access scheme is used for ranging. The ratio between the numbers of periodic ranging slots and data slots in the uplink subframe de...
: This paper briefly summarizes the work towards the final version of ‘Distributed Transaction Processing’ (OSI TP). Several well-known optimizations of the presumed abort prot...
Richard Banks, Peter Furniss, Klaus Heien, Hans-R&...
In this paper, we propose internetworking strategy of WLAN and MANET. Both WLAN and MANET are based on IEEE 802.11 for MAC layer protocol while they adopt different mode, such as i...