Sciweavers

986 search results - page 175 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
SUTC
2010
IEEE
13 years 11 months ago
Generic Information Transport for Wireless Sensor Networks
—A primary functionality of wireless sensor networks (WSNs) is transporting the information acquired by the sensors as per the desired application requirements. The diverse appli...
Faisal Karim Shaikh, Abdelmajid Khelil, Brahim Aya...
WCNC
2010
IEEE
13 years 11 months ago
Optimal Tradeoff Between Transmission Rate and Packet Duration in Wireless Ad Hoc Networks
—This paper considers the tradeoff between bursty and continuous transmissions in wireless ad hoc networks. In our network model, packets belonging to specific transmitters arri...
Jon E. Corneliussen, Mariam Kaynia, Geir E. &Oslas...
WCNC
2010
IEEE
13 years 11 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
IADIS
2004
13 years 9 months ago
Research on the Connectivity Coefficients of Internet Topology
The study on the topological structure of the Internet is very important for the simulation and the protocol design of the Internet. In recent years, some researchers have made pr...
Wang Lin, Guanzhong Dai
CCR
2008
75views more  CCR 2008»
13 years 7 months ago
Removing exponential backoff from TCP
The well-accepted wisdom is that TCP's exponential backoff mechanism, introduced by Jacobson 20 years ago, is essential for preserving the stability of the Internet. In this ...
Amit Mondal, Aleksandar Kuzmanovic