Results 31 to 40 of about 528,739 (288)

Research on multi-dimension features of application layer multicast protocols

open access: yesTongxin xuebao, 2007
A set of application layer multicast protocols were described and classified based on some properties such as data forwarding policy,service model,optimization objectives,optimization techniques,and fault mechanism.Then some recommendations were provided
LIAO Hai-ning, LU Xi-cheng
doaj   +2 more sources

A State-Aware Protocol Fuzzer Based on Application-Layer Protocols

open access: yesIEICE Transactions on Information and Systems, 2011
In the face of constant malicious attacks to network-connected software systems, software vulnerabilities need to be discovered early in the development phase. In this paper, we present AspFuzz, a state-aware protocol fuzzer based on the specifications of application-layer protocols.
Takahisa Kitagawa   +2 more
openaire   +2 more sources

Transport and Application Layer Protocols for IoT: Comprehensive Review

open access: yesTechnologies
The Internet of Things (IoT) connects billions of heterogeneous devices, necessitating lightweight, efficient, and secure communication protocols to support a diverse range of use cases.
Ionel Petrescu   +4 more
doaj   +1 more source

Multicast Routing Protocols in Mobile Ad Hoc Networks: A Comparative Survey and Taxonomy

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
Multicasting plays a crucial role in many applications of mobile ad hoc networks (MANETs). It can significantly improve the performance of these networks, the channel capacity (in mobile ad hoc networks, especially single-channel ones, capacity is a more
Osamah S. Badarneh, Michel Kadoch
doaj   +2 more sources

Survey of network-layer anonymous communication protocols

open access: yes网络与信息安全学报, 2020
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj   +3 more sources

Security in IoMT Communications: A Survey

open access: yesSensors, 2020
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment.
Dimitris Koutras   +5 more
doaj   +1 more source

IETF standardization in the field of the Internet of Things (IoT): a survey [PDF]

open access: yes, 2013
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols ...
Carels, David   +7 more
core   +2 more sources

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Ambient Intelligence Context-Based Cross-Layer Design in Wireless Sensor Networks

open access: yesSensors, 2014
By exchanging information directly between non-adjacent protocol layers, cross-layer (CL) interaction can significantly improve and optimize network performances such as energy efficiency and delay.
Yang Liu   +2 more
doaj   +1 more source

Mining Unclassified Traffic Using Automatic Clustering Techniques [PDF]

open access: yes, 2011
In this paper we present a fully unsupervised algorithm to identify classes of traffic inside an aggregate. The algorithm leverages on the K-means clustering algorithm, augmented with a mechanism to automatically determine the number of traffic clusters.
Finamore, Alessandro   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy