A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
MCoRe: an adaptive scheme for rerouting multicast connections in mobile ATM networks
2002
Computer Communications
In this paper we propose multicast connection rerouting (MCoRe), a novel scheme for ef®cient multicasting in mobile asynchronous transfer mode (ATM) networks. ...
With MCoRe, source migration is transparent to the multicast group members and does not entail reconstruction of existing multicast tree. ...
CBT [14] ) can be employed in ATM networks where multicast group members only need to setup a connection to the core for sending/receiving data. ...
doi:10.1016/s0140-3664(01)00336-x
fatcat:aaksqgiwlbfphesex3jyeutjri
Cross-Layer Collaborative In-Network Processing in Multihop Wireless Sensor Networks
2007
IEEE Transactions on Mobile Computing
, but also synchronize their communication activities to exchange partially processed data for parallel processing. ...
Emerging Wireless Sensor Network (WSN) applications demand considerable computation capacity for in-network processing. ...
ACKNOWLEDGMENTS The authors would like to thank Yang Yu for providing the simulator of EbTA [14] . ...
doi:10.1109/tmc.2007.39
fatcat:3mchdl4rn5ajxgrgmzuqnogkne
An initial analysis of packet function-aware extension to Dijkstra algorithm for wireless networks
2016
EURASIP Journal on Wireless Communications and Networking
In particular, we propose a generic algorithm for packet function-aware path setup for multi-hop networks. ...
We did initial analysis based on simulation of the algorithm for various random multi-hop wireless networks (e.g., 802.11), utilizing realistic link delay models. ...
In these simulations, we compute the PFA_SPF algorithm and find possibly multiple shortest-path trees from the source node to all other nodes in the network where each tree is optimized for an optimum ...
doi:10.1186/s13638-016-0544-1
fatcat:5oy46pbhmzdy7nkmyzdk7dgfuq
A Novel Wake-Up Receiver with Addressing Capability for Wireless Sensor Nodes
2014
2014 IEEE International Conference on Distributed Computing in Sensor Systems
Emerging low-power radio triggering techniques for wireless motes are a promising approach to prolong the lifetime of Wireless Sensor Networks (WSNs). ...
By allowing nodes to activate their main transceiver only when data need to be transmitted or received, wake-up-enabled solutions virtually eliminate the need for idle listening, thus drastically reducing ...
Spenza also gratefully acknowledges support from a Google Europe Doctoral Fellowship. ...
doi:10.1109/dcoss.2014.9
dblp:conf/dcoss/PetrioliSTT14
fatcat:dcj2ibkq3fd4xijxexnxrvpetu
Recent Security Trends in Internet of Things: a Comprehensive Survey
2021
IEEE Access
-Data reliability is highly required for critical IoT applications such as healthcare systems. ...
A summary of the proposed security schemes for IoT is Encryption key, DoS, MTM provided in Table 8 .
A. ...
doi:10.1109/access.2021.3103725
fatcat:elfjfrhtnjfvhjp5jqtkj7r7gy
Communication Requirements for a Hybrid VSC Based HVDC/AC Transmission Networks State Estimation
2021
Energies
It is concluded that the time requirements can be fulfilled for a hybrid HVDC/AC network. ...
In addition, a case study of a complete cycle for a unified Weighted Least Squares (WLS) state estimation is tested on a hybrid HVDC/AC transmission network, based on Voltage Source Converter (VSC). ...
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/en14041087
fatcat:kfz4gftfhvcexoxrp7fdn7owq4
Energy efficient wireless unicast routing alternatives for machine-to-machine networks
2011
Journal of Network and Computer Applications
Constructing energy-efficient routes for sending data through such networks is important not only for the longevity of the nodes which typically depend on battery energy, but also for achieving an environmentally ...
Energy-efficient networks M2M M2M applications M2M communication a b s t r a c t Machine-to-machine (M2M) communications is a new and rapidly developing technology for largescale networking of devices ...
Consider, for instance, an M2M security system which is supposed to send an alarm to a control center when an intrusion, a fire, etc., is detected. ...
doi:10.1016/j.jnca.2011.02.005
fatcat:tubfylpwwnbgbltvn7homotn2i
Security and Privacy Protection in Visual Sensor Networks
2014
ACM Computing Surveys
A central contribution of this survey is our classification of VSN security aspects into data-centric, node-centric, network-centric, and user-centric security. ...
In a holistic approach, security and privacy protection must not stop at the data level. ...
ACKNOWLEDGMENTS This work was performed as part of the project TrustEYE: Trustworthy Sensing and Cooperation in Visual Sensor Networks. 2 The work was supported by funding from the European Regional Development ...
doi:10.1145/2545883
fatcat:hkqdjt3ykvhtrp3vc3ce5mzd5m
Investigation of mechanisms for routing in mobile ad-hoc network
2017
MA ODDP Multicasting Scenario one Nodes join a multicast tree to transfer some data to a node which is a part of a multicast tree for which the node is not a member. ...
If a node wishes to join a multicast tree for which it is not a member, it can invoke a multicast joining request by broadcasting a Joining query (MJR) to the multicast group. ...
These ACK messages in MAODDP serve two purposes i. e. establishment of route and simultaneous data delivery. ...
doi:10.24377/ljmu.t.00005840
fatcat:65mvebpm7jedfnyskirzukicte
Unified Role Assignment Framework For Wireless Sensor Networks UNIFIED ROLE-ASSIGNMENT FRAMEWORK FOR WIRELESS SENSOR NETWORKS
2010
unpublished
(Mirkovic et al., 2001 ) organize a large-scale sensor network by maintaining a dynamic multicast tree-based forwarding hierarchy that allows multiple sinks to obtain data from a (sensor) source. ...
An array of sensors on The basestation acts as a gateway between the remote data processing center and the sensor network. ...
fatcat:7pvjhfqkcvhevppfkej73ptmee
CLOUD COMPUTING 2011 Editors
2011
The Second International Conference on Cloud Computing, GRIDs, and Virtualization
unpublished
The copyright release is a transfer of publication rights, which allows IARIA and its partners to drive the dissemination of the published material. ...
This allows IARIA to give articles increased visibility via distribution, inclusion in libraries, and arrangements for submission to indexes. ...
And a record-andreplay scheme for this DCSM is designed. ...
fatcat:ckpewilt4vcutmzrx2jtagih4q
Secure Data Transmission in Wireless Sensor Networks
[article]
2013
., todays' deployed wireless sensor networks use UDP for data transmission towards a sink and TCP is used for administrative functions (e.g. node configuration) [21]. ...
research questions in the field of e cient data transmission: (E1) Is the IP Flow Information Export (IPFIX) protocol a viable solution for transmission of sensor data in wireless sensor networks? ...
Acknowledgements In order to develop a doctoral thesis, support of many people is required. Prof. ...
doi:10.2313/net-2013-07-2
fatcat:ybzrln3ggngupkoga7j56jazzm
Fifth Research and Development Framework Programme 1998-2002: Applications Relating to Health. Final Report
[article]
2005
Report on the research and development of information technologies for applications related to health from 1998-2002. ...
on whether o r not an urgent referral is required for a suspected cancer patient; a web-based graphical toolkit for creating a 'family tree'. ...
for a structured data entry. ...
doi:10.11575/prism/10567
fatcat:5mh6fwxyhncdje6ze4peentek4
Implementation of Physical Layer of a Network via Practical Analysis
2021
The fascination for networking started as a kid when I wondered how my computer was connected to a world wide web. Data being sent and received from one computer to other fascinated me. ...
Its establishment took a long time and it is in continuous improvement till date. ...
Use a drop wire guard or reroute the drop if trees are in the way. Trimming trees on private property should be limited. The owner is responsible for removing any limbs and large branches. ...
doi:10.7939/r3-n4bz-1769
fatcat:gshkst4vfvbshbzrzt5z2h7tzq