Results 71 to 80 of about 29,223 (187)

Distributed and Location-Based Multicast Routing Algorithms for Wireless Sensor Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
Multicast routing protocols in wireless sensor networks are required for sending the same message to multiple different destinations. In this paper, we propose two different distributed algorithms for multicast routing in wireless sensor networks which ...
Hakki Bagci, Ibrahim Korpeoglu
doaj   +2 more sources

Research of Tree-based Multicast Routing Protocols for Ad Hoc Networks

open access: yesMATEC Web of Conferences, 2018
Multicast is an important function of Ad Hoc network. It is a point to multipoint or multipoint to multipoint packet transmitting mode. Group management and maintenance, multicast packet routing are two factors of multicast protocol.
Jiao Yang
doaj   +1 more source

On generating multicast routes for SpiNNaker [PDF]

open access: yesProceedings of the 11th ACM Conference on Computing Frontiers, 2014
The human brain is an immense biological neural network characterized by high degrees of connectivity among neurons. Any system designed to simulate biologically-plausible spiking neuronal networks needs to support such connectivity and the associated communication traffic in the form of spike events.
Navaridas, Javier   +4 more
openaire   +1 more source

Priority‐based resource optimisation and user association in integrated networks

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
This paper focuses on optimising energy efficiency, resource utilisation, and task priority‐based user association. The authors solve this optimisation problem using three methods: the branch and bound algorithm (BBA), the interior point method (IPM), and the barrier simplex algorithm (BSA).
Sana Sharif, Shahid Manzoor, Waleed Ejaz
wiley   +1 more source

Multicast in DKS(N, k, f) Overlay Networks [PDF]

open access: yes, 2003
Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures for Internet scale applications.
Ali Ghodsi   +4 more
core   +7 more sources

Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
This paper provides a comprehensive analysis of the Ack spoofing attack and offers practical solutions to enhance the security of IEEE 802.11 networks. Through detailed simulations and analysis, the effectiveness of proposed attack strategies and detection and mitigation technique is demonstrated across various scenarios.
Ayat Al‐Wraikat   +2 more
wiley   +1 more source

Quantum Key Distribution‐Adaptation‐Based Security Enhancement of Software‐Defined Optical Network via Dynamic Quantum Resource Management

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
We propose a heuristic adaptive quantum routing (RWTA_AQR) algorithm for routing, wavelength and timeslot assignment. RWTA_AQR utilises the FirstFit algorithm to assign wavelengths in both contiguous and noncontiguous timeslots for optimal resource utilisation based on the priority.
Vimal Bhatia   +2 more
wiley   +1 more source

Concurrent Geometric Multicasting

open access: yes, 2017
We present MCFR, a multicasting concurrent face routing algorithm that uses geometric routing to deliver a message from source to multiple targets. We describe the algorithm's operation, prove it correct, estimate its performance bounds and evaluate its ...
Bramas Quentin   +5 more
core   +2 more sources

Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán   +2 more
wiley   +1 more source

Delay constraint supported overlay multicast routing protocol

open access: yesTongxin xuebao, 2005
The degree and delay constrained routing problem in overlay multicast was studied, and a new overlay multicast routing protocol called delay bounded tree protocol (DBTP) was proposed.
WU Jia-gao   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy