Sciweavers

986 search results - page 107 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
MASCOTS
2007
13 years 10 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon
TWC
2011
367views more  TWC 2011»
13 years 4 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien
MSWIM
2004
ACM
14 years 2 months ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl
AINA
2005
IEEE
13 years 11 months ago
Traffic Aggregation Based SIP over MPLS Network Architecture
—In this paper, a traffic aggregation based SIP over MPLS network architecture is proposed to integrate SIP protocol with traffic engineering (TE) enabled MPLS network seamlessly...
Bo Rong, Jacques Lebeau, Maria Bennani, Michel Kad...
CORR
2004
Springer
80views Education» more  CORR 2004»
13 years 9 months ago
Notes On The Design Of An Internet Adversary
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...