Results 71 to 80 of about 29,223 (187)
Distributed and Location-Based Multicast Routing Algorithms for Wireless Sensor Networks
Multicast routing protocols in wireless sensor networks are required for sending the same message to multiple different destinations. In this paper, we propose two different distributed algorithms for multicast routing in wireless sensor networks which ...
Hakki Bagci, Ibrahim Korpeoglu
doaj +2 more sources
Research of Tree-based Multicast Routing Protocols for Ad Hoc Networks
Multicast is an important function of Ad Hoc network. It is a point to multipoint or multipoint to multipoint packet transmitting mode. Group management and maintenance, multicast packet routing are two factors of multicast protocol.
Jiao Yang
doaj +1 more source
On generating multicast routes for SpiNNaker [PDF]
The human brain is an immense biological neural network characterized by high degrees of connectivity among neurons. Any system designed to simulate biologically-plausible spiking neuronal networks needs to support such connectivity and the associated communication traffic in the form of spike events.
Navaridas, Javier +4 more
openaire +1 more source
Priority‐based resource optimisation and user association in integrated networks
This paper focuses on optimising energy efficiency, resource utilisation, and task priority‐based user association. The authors solve this optimisation problem using three methods: the branch and bound algorithm (BBA), the interior point method (IPM), and the barrier simplex algorithm (BSA).
Sana Sharif, Shahid Manzoor, Waleed Ejaz
wiley +1 more source
Multicast in DKS(N, k, f) Overlay Networks [PDF]
Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures for Internet scale applications.
Ali Ghodsi +4 more
core +7 more sources
Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation
This paper provides a comprehensive analysis of the Ack spoofing attack and offers practical solutions to enhance the security of IEEE 802.11 networks. Through detailed simulations and analysis, the effectiveness of proposed attack strategies and detection and mitigation technique is demonstrated across various scenarios.
Ayat Al‐Wraikat +2 more
wiley +1 more source
We propose a heuristic adaptive quantum routing (RWTA_AQR) algorithm for routing, wavelength and timeslot assignment. RWTA_AQR utilises the FirstFit algorithm to assign wavelengths in both contiguous and noncontiguous timeslots for optimal resource utilisation based on the priority.
Vimal Bhatia +2 more
wiley +1 more source
Concurrent Geometric Multicasting
We present MCFR, a multicasting concurrent face routing algorithm that uses geometric routing to deliver a message from source to multiple targets. We describe the algorithm's operation, prove it correct, estimate its performance bounds and evaluate its ...
Bramas Quentin +5 more
core +2 more sources
Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán +2 more
wiley +1 more source
Delay constraint supported overlay multicast routing protocol
The degree and delay constrained routing problem in overlay multicast was studied, and a new overlay multicast routing protocol called delay bounded tree protocol (DBTP) was proposed.
WU Jia-gao +3 more
doaj +2 more sources

