Sciweavers

640 search results - page 39 / 128
» Topology Without Tears
Sort
View
TELSYS
2010
147views more  TELSYS 2010»
13 years 2 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
INFOCOM
2011
IEEE
12 years 11 months ago
Smart sleep: Sleep more to reduce delay in duty-cycled wireless sensor networks
A simple random walk (SRW) has been considered as an effective forwarding method for many applications in wireless sensor networks (WSNs) due to its desirable properties. However...
Chul-Ho Lee, Do Young Eun
COMSWARE
2007
IEEE
14 years 1 months ago
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks
—This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution sys...
Deepesh Man Shrestha, Young-Bae Ko
ICNP
2006
IEEE
14 years 1 months ago
Scaling IP Routing with the Core Router-Integrated Overlay
— IP routing scalability is based on hierarchical routing, which requires that the IP address hierarchy be aligned with the physical topology. Both site multi-homing and switchin...
Xinyang Zhang, Paul Francis, Jia Wang, Kaoru Yoshi...
SMI
2005
IEEE
14 years 1 months ago
Mesh Editing with an Embedded Network of Curves
We propose a new topological data structure for representing a set of polygonal curves embedded in a meshed surface. In this embedding, the vertices of the curve do not necessaril...
Wan-Chiu Li, Bruno Lévy, Jean-Claude Paul