Sciweavers

ACISP
2007
Springer
14 years 3 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
SIGCOMM
1994
ACM
14 years 3 months ago
An Architecture for Wide-Area Multicast Routing
Existing multicast routing mechanisms were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. When group members, and sende...
Stephen E. Deering, Deborah Estrin, Dino Farinacci...
ICNP
1999
IEEE
14 years 3 months ago
TCP Trunking: Design, Implementation and Performance
A TCP trunk is an aggregate traffic stream whose data packets are transported at a rate dynamically determined by TCP
H. T. Kung, Shie Yuan Wang
IMC
2003
ACM
14 years 4 months ago
On the correspondency between TCP acknowledgment packet and data packet
At the TCP sender side, the arrival of an ack packet always triggers the sender to send data packets, which establishes a correspondency between the arrived ack packet and the sen...
Guohan Lu, Xing Li
ICPP
2003
IEEE
14 years 4 months ago
Dynamic Control Frames in Reservation-Based Packet Scheduling for Single-Hop WDM Networks
In reservation-based packet scheduling algorithms for single-hop WDM networks, one of the wavelengths is used as a control channel which is shared by all of the nodes for transmit...
Hwa-Chun Lin, Pei-Shin Liu
ACMSE
2004
ACM
14 years 4 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
IAT
2006
IEEE
14 years 5 months ago
An Intelligent Multi-hop Routing for Wireless Sensor Networks
With the advancement of micro-sensor and radio technology, wireless sensor networks are deployed in various applications. In a continuous monitoring application, sensors gather in...
Obidul Islam, Sajid Hussain
INFOCOM
2007
IEEE
14 years 5 months ago
Analysis of A Loss-Resilient Proactive Data Transmission Protocol in Wireless Sensor Networks
Abstract— Many of sensor network applications require reliable data communication such that data packets can be delivered to the destination without loss. However, existing relia...
Yingqi Xu, Wang-Chien Lee, Jianliang Xu
INFOCOM
2007
IEEE
14 years 5 months ago
RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks
—Duty-cycle MAC protocols have been proposed to meet the demanding energy requirements of wireless sensor networks. Although existing duty-cycle MAC protocols such as S-MAC are p...
Shu Du, Amit Kumar Saha, David B. Johnson
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
14 years 5 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...