SAT and SMT-Based Verification of Security Protocols Including Time Aspects
For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication.
Sabina Szymoniak +4 more
doaj +1 more source
Evaluation of network coding techniques for a sniper detection application [PDF]
This paper experimentally studies the reliability and delay of flooding based multicast protocols for a sniper detection application. In particular using an emulator it studies under which conditions protocols based on network coding deliver performance ...
Argyraki, Katerina J +3 more
core +2 more sources
CMT performance optimization algorithm based on union prediction of bandwidth and round trip time
Concurrent multipath transfer (CMT) uses the stream control transmission protocol's (SCTP) multihoming feature to distribute data across multiple end-to-end paths in a multihomed SCTP association.
LI Wen +4 more
doaj +1 more source
Cost-efficient vaccination protocols for network epidemiology. [PDF]
We investigate methods to vaccinate contact networks-i.e. removing nodes in such a way that disease spreading is hindered as much as possible-with respect to their cost-efficiency.
Petter Holme, Nelly Litvak
doaj +1 more source
Implementation of CAVENET and its usage for performance evaluation of AODV, OLSR and DYMO protocols in vehicular networks [PDF]
Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is ...
Barolli, Leonard +5 more
core +3 more sources
Network Adaptive Deadband: NCS Data Flow Control for Shared Networks
This paper proposes a new middleware solution called Network Adaptive Deadband (NAD) for long time operation of Networked Control Systems (NCS) through the Internet or any shared network based on IP technology.
Miguel Díaz-Cacho +3 more
doaj +1 more source
Distributed quantum sensing enhanced by continuous-variable error correction [PDF]
A distributed sensing protocol uses a network of local sensing nodes to estimate a global feature of the network, such as a weighted average of locally detectable parameters.
Jiang, Liang +2 more
core +2 more sources
Survey of network-layer anonymous communication protocols
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj +3 more sources
Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah
IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability.
Le Tian +3 more
doaj +1 more source
Performance Comparison of Contention- and Schedule-based MAC Protocols in Urban Parking Sensor Networks [PDF]
Network traffic model is a critical problem for urban applications, mainly because of its diversity and node density. As wireless sensor network is highly concerned with the development of smart cities, careful consideration to traffic model helps choose
Lin, Trista +2 more
core +4 more sources

