Results 21 to 30 of about 1,289,066 (290)

Evaluation of network coding techniques for a sniper detection application [PDF]

open access: yes, 2011
This paper experimentally studies the reliability and delay of flooding based multicast protocols for a sniper detection application. In particular using an emulator it studies under which conditions protocols based on network coding deliver performance ...
Argyraki, Katerina J   +3 more
core   +2 more sources

Implementation of CAVENET and its usage for performance evaluation of AODV, OLSR and DYMO protocols in vehicular networks [PDF]

open access: yes, 2010
Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is ...
Barolli, Leonard   +5 more
core   +3 more sources

SAT and SMT-Based Verification of Security Protocols Including Time Aspects

open access: yesSensors, 2021
For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication.
Sabina Szymoniak   +4 more
doaj   +1 more source

CMT performance optimization algorithm based on union prediction of bandwidth and round trip time

open access: yes工程科学学报, 2015
Concurrent multipath transfer (CMT) uses the stream control transmission protocol's (SCTP) multihoming feature to distribute data across multiple end-to-end paths in a multihomed SCTP association.
LI Wen   +4 more
doaj   +1 more source

Narrowband delay tolerant protocols for WSN applications. Characterization and selection guide [PDF]

open access: yes, 2017
This article focuses on delay tolerant protocols for Wireless Sensor Network (WSN) applications, considering both established and new protocols. We obtained a comparison of their characteristics by implementing all of them on an original platform for ...
Malavenda, Claudio S.   +2 more
core   +1 more source

Cost-efficient vaccination protocols for network epidemiology. [PDF]

open access: yesPLoS Computational Biology, 2017
We investigate methods to vaccinate contact networks-i.e. removing nodes in such a way that disease spreading is hindered as much as possible-with respect to their cost-efficiency.
Petter Holme, Nelly Litvak
doaj   +1 more source

QuNetSim: A Software Framework for Quantum Networks

open access: yes, 2020
As quantum internet technologies develop, the need for simulation software and education for quantum internet rises. QuNetSim aims to fill this need. QuNetSim is a Python software framework that can be used to simulate quantum networks up to the network ...
Beşe, Mehmet Mert   +3 more
core   +1 more source

The impact of physical conditions on network connectivity in wireless sensor network [PDF]

open access: yes, 2010
In Wireless Sensor Networks, end-to-end routing paths need to be established when nodes want to communicate with the desired destination. For nodes assumed to be static, many routing protocols such as Directed Diffusion have been proposed to meet this ...
Andonovic, Ivan   +4 more
core   +1 more source

Network Adaptive Deadband: NCS Data Flow Control for Shared Networks

open access: yesSensors, 2012
This paper proposes a new middleware solution called Network Adaptive Deadband (NAD) for long time operation of Networked Control Systems (NCS) through the Internet or any shared network based on IP technology.
Miguel Díaz-Cacho   +3 more
doaj   +1 more source

Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah

open access: yesSensors, 2017
IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability.
Le Tian   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy