Results 61 to 70 of about 29,223 (187)

QoS multicast routing with heterogeneous receivers [PDF]

open access: yesGLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2003
When supporting source-specific heterogeneous-receiver multimedia applications, a multicast tree is built among a source and the receivers such that the path from the source to each receiver satisfies the delay and bandwidth constraints. To optimize the network usage, it is desirable to find a multicast tree that minimizes the total bandwidth used ...
Wang, J, Nahrstedt, K, Xiao, L, Lui, KS
openaire   +2 more sources

RETRACTED: Resource allocation for integrated satellite‐terrestrial networks based on RSMA

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
We first establish a downlink transmission framework for the integrated satellite‐terrestrial network based on RSMA, to achieve high data rate transmission of virtual reality applications globally. Then, considering some practical constraints, a joint resource allocation problem of rate and transmission power is formulated.
Jianfeng Shi   +3 more
wiley   +1 more source

Alternate Path Routing for Multicast

open access: yesIEEE/ACM Transactions on Networking, 2002
Current network-layer multicast routing protocols build multicast trees based only on hop count and policy. If a tree cannot meet application requirements, the receivers have no alternative. In this paper, we propose a general and modular architecture that integrates alternate path routing with the network's multicast services.
openaire   +2 more sources

A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani   +3 more
wiley   +1 more source

Load balance multicast routing algorithms on overlay network

open access: yesTongxin xuebao, 2009
Overlay networks had been recently developed to support multicast framework.Specially,overlay architec-tures based on proxies and leased lines could provide applications with optimal performance in terms of bandwidth,reliability,delay guarantee,etc.A ...
ZHANG Xiao-yu, ZHANG Guang-zhao
doaj   +2 more sources

Optimal wavelength-routed multicasting

open access: yesDiscrete Applied Mathematics, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Beauquier, Bruno   +2 more
openaire   +1 more source

A Thorough Review of Security in Information‐Centric Networking

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The rapid evolution of technology has revealed the limitations of host‐centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information‐centric networking (ICN), which focuses on content (data) regardless of its location in the network.
Ado Adamou Abba Ari   +7 more
wiley   +1 more source

Multicast service protection algorithm based on elastic optical network

open access: yesTongxin xuebao, 2019
With the rapid growth of the network traffic,the elastic optical network (EON) has been proposed as a promising solution due to its high spectrum efficiency and flexible bandwidth provision.Meanwhile,multicast routing and spectrum allocation,and the ...
Jingjing WU, Jianfang ZHANG
doaj   +2 more sources

Utility-Based Joint Routing, Network Coding, and Power Control for Wireless Ad Hoc Networks

open access: yesInternational Journal of Digital Multimedia Broadcasting, 2011
Energy saving and high delivery reliability are two essential metrics in wireless ad hoc networks. In this paper, we propose a joint power control and network coding (PCNC) scheme which regulates the transmission power to reduce the overall energy usage ...
Kaiqian Ou   +3 more
doaj   +1 more source

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy