Sciweavers

WWIC
2007
Springer
123views Communications» more  WWIC 2007»
14 years 6 months ago
An Experimental Investigation of the Congestion Control Used by Skype VoIP
Abstract. The explosive growth of VoIP trac poses a potential challenge to the stability of the Internet that, up to now, has been guaranteed by the TCP congestion control. In thi...
Luca De Cicco, Saverio Mascolo, Vittorio Palmisano
WWIC
2007
Springer
109views Communications» more  WWIC 2007»
14 years 6 months ago
QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework
It is sometimes believed that a “broadband access” network, providing ample transmission capacity to residential environments, is enough so as to allow a flawless delivery of a...
Iván Vidal, Francisco Valera, Jaime Garc&ia...
WWIC
2007
Springer
182views Communications» more  WWIC 2007»
14 years 6 months ago
Multicast Overlay Spanning Tree Protocol for Ad Hoc Networks
In this paper we present an extension to the OLSR unicast routing protocol to support multicast routing in mobile ad hoc networks. The proposed protocol is based on Multicast Overl...
Georgios Rodolakis, Amina Meraihi Naimi, Anis Laou...
WWIC
2007
Springer
247views Communications» more  WWIC 2007»
14 years 6 months ago
Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks
Vehicular ad-hoc networks (VANETs) offer a large number of new potential applications without relying on significant infrastructure. Many of these applications benefit from multi-h...
Maria Kihl, Mihail L. Sichitiu, Ted Ekeroth, Micha...
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 6 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
WWIC
2007
Springer
125views Communications» more  WWIC 2007»
14 years 6 months ago
Fault Tolerant Scalable Support for Network Portability and Traffic Engineering
The P-SHIM6 architecture provides ISP independence to IPv6 sites without compromising scalability. This architecture is based on a middle-box, the P-SHIM6, which manages the SHIM6 ...
Marcelo Bagnulo, Alberto García-Martí...
WWIC
2007
Springer
102views Communications» more  WWIC 2007»
14 years 6 months ago
SCTP Performance Issue on Path Delay Differential
This paper studies the effect of path delay on SCTP performance. It focuses on the SCTP fast retransmit algorithm and demonstrates that the performance in the current retransmissio...
Yuansong Qiao, Enda Fallon, Liam Murphy, John Murp...
WWIC
2007
Springer
103views Communications» more  WWIC 2007»
14 years 6 months ago
Multi-rate Relaying for Performance Improvement in IEEE 802.11 WLANs
It is well known that the presence of nodes using a low data transmit rate has a disproportionate impact on the performance of an IEEE 802.11 WLAN. ORP is an opportunistic relay pr...
Laura Marie Feeney, Bilge Cetin, Daniel Hollos, Ma...
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
14 years 6 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
SAGA
2007
Springer
14 years 6 months ago
Randomized Algorithms and Probabilistic Analysis in Wireless Networking
Abstract. Devices connected wirelessly, in various forms including computers, hand-held devices, ad hoc networks, and embedded systems, are expected to become ubiquitous all around...
Aravind Srinivasan