Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Brian DeCleene"'
Publikováno v:
INFOCOM
Large organizations often have users in multiple sites which are connected over the Internet. Since resources are limited, communication between these sites needs to be carefully orchestrated for the most benefit to the organization. We present a Mis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::38b938ae130c93e66e42cf20c1889069
http://arxiv.org/abs/1701.08098
http://arxiv.org/abs/1701.08098
Publikováno v:
Performance Evaluation. 49:1-20
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a member joins or leaves the group's session. Hierarchical approaches have recently
Publikováno v:
MobiSys
Wireless researchers face the practical challenge of evaluating the performance of new routing protocols for very large-scale heterogeneous mobile systems. While simulation platforms, tools and techniques have matured, doubts remain about the broad v
Publikováno v:
MILCOM
In this paper, we present a solution to the problem of scaling MANETs beyond 100 nodes, while providing service levels comparable to cellular networks. Flat MANETs are limited to about 100 nodes due to the high overhead of control traffic and the hig
Publisher Summary This chapter presents control over network coding for enhanced radio transport optimization (CONCERTO), a fully implemented communication system based on a network coding protocol stack and reviews observations and results from rece
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6593b3645b7fc4727ae1e219de7ce19a
https://doi.org/10.1016/b978-0-12-380918-6.00006-8
https://doi.org/10.1016/b978-0-12-380918-6.00006-8
Publikováno v:
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
While network coding offers many theoretical properties that can be used to improve performance, practical experiences have been largely limited to simulation, emulation, and small-scale demonstrations. This paper reviews observations and results fro
Publikováno v:
MILCOM 2009 - 2009 IEEE Military Communications Conference.
In previous work, we proposed a “Bootstrap” protocol for establishing neighbor relationships, between two mobile nodes in a mission critical deny-by-default Mobile Ad-hoc Network. In this paper, we formally characterize the security properties of
Publikováno v:
MILCOM 2009 - 2009 IEEE Military Communications Conference.
Estimating network parameters from noisy data is a hard problem that can be made even more difficult by the presence of a malicious adversary who may corrupt the measurement process by capturing a trusted node or perturbing data externally. The adver
Publikováno v:
MILCOM 2008 - 2008 IEEE Military Communications Conference.
An intrinsically assurable mobile ad hoc network (IAMANET) will directly support the integrity, availability, reliability, confidentiality, and safety of MANET communications and data. In contrast, the dominant Internet paradigm is intrinsically inse
Publikováno v:
MILCOM 2008 - 2008 IEEE Military Communications Conference.
We investigate the bootstrapping of policy-based access control in a deny-by-default mission-critical MANET. In the absence of any initial policies, a deny-by-default system fundamentally prevents all traffic flow. Providing all policies prior to dep