Sciweavers

329 search results - page 19 / 66
» Source Routing and Scheduling in Packet Networks
Sort
View
ICDCS
2006
IEEE
14 years 1 months ago
High-Throughput Multicast Routing Metrics in Wireless Mesh Networks
The stationary nature of nodes in a mesh network has shifted the main design goal of routing protocols from maintaining connectivity between source and destination nodes to findi...
Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra ...
BROADNETS
2005
IEEE
14 years 1 months ago
Bandwidth guaranteed multicast scheduling for virtual output queued packet switches
Multicast enables efficient data transmission from one source to multiple destinations, and has been playing an important role in Internet multimedia applications. Although sever...
Deng Pan, Yuanyuan Yang
INFOCOM
2002
IEEE
14 years 10 days ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
INFOCOM
2011
IEEE
12 years 10 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 9 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu