Distance-vector routing protocol

Results: 165



#Item
31Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering Pennsylvania State

Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering Pennsylvania State

Add to Reading List

Source URL: www.enck.org

Language: English
32Microsoft Word - complete_paper.doc

Microsoft Word - complete_paper.doc

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-01-15 21:50:03
33Capturing Complexity in Networked Systems Design: The Case for Improved Metrics Sylvia Ratnasamy Intel Research  A BSTRACT

Capturing Complexity in Networked Systems Design: The Case for Improved Metrics Sylvia Ratnasamy Intel Research A BSTRACT

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-01-16 05:55:40
34Geographic Routing without Location Information Ananth Rao Sylvia Ratnasamy∗ Christos Papadimitriou  Scott Shenker† Ion Stoica

Geographic Routing without Location Information Ananth Rao Sylvia Ratnasamy∗ Christos Papadimitriou Scott Shenker† Ion Stoica

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2004-08-20 14:52:11
35NetComplex: A Complexity Metric for Networked System Designs Byung-Gon Chun ICSI Sylvia Ratnasamy Intel Research Berkeley

NetComplex: A Complexity Metric for Networked System Designs Byung-Gon Chun ICSI Sylvia Ratnasamy Intel Research Berkeley

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2008-02-19 22:45:36
36Performance of Taroko, a Cluster-based Addressing and Routing scheme for Self-Organized Networks ∗ †

Performance of Taroko, a Cluster-based Addressing and Routing scheme for Self-Organized Networks ∗ †

Add to Reading List

Source URL: www.synclab.org

Language: English - Date: 2015-02-14 01:17:26
37

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:40
38Risk-Aware Response for Mitigating MANET Routing Attacks Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, US

Risk-Aware Response for Mitigating MANET Routing Attacks Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, US

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2010-08-02 20:35:26
39The Pulse Protocol: Energy Efficient Infrastructure Access Baruch Awerbuch, David Holmer, and Herbert Rubens Department of Computer Science Johns Hopkins University Baltimore, MD

The Pulse Protocol: Energy Efficient Infrastructure Access Baruch Awerbuch, David Holmer, and Herbert Rubens Department of Computer Science Johns Hopkins University Baltimore, MD

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2007-10-09 11:16:16
40Routing in Multi-hop Wireless Mesh Networks with Bandwidth Guarantees Ronghui Hou, King-Shan Lui, Hon Sun Chiu, Kwan L. Yeung Department of Electrical and Electronic Engineering, The University of Hong Kong  {rhhou, kslu

Routing in Multi-hop Wireless Mesh Networks with Bandwidth Guarantees Ronghui Hou, King-Shan Lui, Hon Sun Chiu, Kwan L. Yeung Department of Electrical and Electronic Engineering, The University of Hong Kong {rhhou, kslu

Add to Reading List

Source URL: www.eee.hku.hk

Language: English - Date: 2012-06-13 00:42:16