Sciweavers

663 search results - page 69 / 133
» The Scalable Networking Scheme for High-Speed Networks
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
WD
2010
15 years 2 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla
INFOCOM
2003
IEEE
15 years 9 months ago
Optimal Bandwidth Reservation Schedule in Cellular Network
Abstract— Efficient bandwidth allocation strategy with simultaneous fulfillment of QoS requirement of a user in a mobile cellular network is still a critical and an important p...
Samrat Ganguly, B. R. Badrinath, Navin Goyal
ICCCN
2007
IEEE
15 years 8 months ago
Applying Wavelet De-noising to Improve TCP Throughput in AQM queues with Existence of Unresponsive Traffic
Abstract-- in the current Internet, congestion control is performed jointly by the end systems running the TCP protocol and by routers running Active Queue Management (AQM) algorit...
Yi Pan, Wei K. Tsai, Tatsuya Suda
UBIMOB
2009
ACM
225views Management» more  UBIMOB 2009»
15 years 9 months ago
Historical data storage for large scale sensor networks
Wireless sensor networks are rapidly finding their way through a plethora of new applications like precision farming and forestry, with increasing network scale, system complexit...
Loïc Petit, Abdelhamid Nafaa, Raja Jurdak