• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 9,057
Next 10 →

Faster FPGA Routing Solution using DNA Computing

by unknown authors
"... Abstract—There are many classical algorithms for finding routing in FPGA. But Using DNA computing we can solve the routes efficiently and fast. The run time complexity of DNA algorithms is much less than other classical algorithms which are used for solving routing in FPGA. The research in DNA compu ..."
Abstract - Add to MetaCart
computing procedure. In this paper we have proposed two tier approaches for the FPGA routing solution. First, geometric FPGA detailed routing task is solved by transforming it into a Boolean satisfiability equation with the property that any assignment of input variables that satisfies the equation

A Survey of QoS Routing Solutions for Mobile Ad hoc Networks

by L. Hanzo , R. Tafazolli
"... In mobile ad hoc networks (MANETs), the provision of Quality of Service (QoS) guarantees is much more challenging than in wireline networks, mainly due to node mobility, multi-hop communications, contention for channel access and a lack of central coordination. QoS guarantees are required by most m ..."
Abstract - Cited by 42 (0 self) - Add to MetaCart
of any QoS solution since its function is to ascertain which nodes, if any, are able to serve applications’ requirements. Consequently, it also plays a crucial role in data session admission control. This document offers an up-to-date survey of most major contributions to the pool of QoS routing

Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks

by Tirthankar Ghosh, Niki Pissinou, Kami (Sam) Makki , 2005
"... Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicio ..."
Abstract - Cited by 13 (1 self) - Add to MetaCart
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when

Application-Level Multicast Using Content-Addressable Networks

by Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker , 2001
"... Most currently proposed solutions to application-level multicast organize the group members into an application-level mesh over which a DistanceVector routing protocol, or a similar algorithm, is used to construct source-rooted distribution trees. The use of a global routing protocol limits the s ..."
Abstract - Cited by 372 (8 self) - Add to MetaCart
Most currently proposed solutions to application-level multicast organize the group members into an application-level mesh over which a DistanceVector routing protocol, or a similar algorithm, is used to construct source-rooted distribution trees. The use of a global routing protocol limits

The Quest for Security in Mobile Ad Hoc Networks

by Jean-Pierre Hubaux, Levente Buttyan , 2001
"... So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overview of security problems for mobile ad hoc networks, distinguishing the threats on basic mechanisms and on security mecha ..."
Abstract - Cited by 348 (12 self) - Add to MetaCart
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overview of security problems for mobile ad hoc networks, distinguishing the threats on basic mechanisms and on security

Maximum Lifetime Routing In Wireless Sensor Networks

by Jae-hwan Chang, Leandros Tassiulas - IEEE/ACM TRANSACTIONS ON NETWORKING , 2000
"... Routing in power-controlled wireless sensor networks is formulated as an optimization problem with the goal of maximizing the system lifetime. Considering that the information is delivered in the form of packets, we identified the problem as an integer programming problem. It is known that the syste ..."
Abstract - Cited by 282 (0 self) - Add to MetaCart
Routing in power-controlled wireless sensor networks is formulated as an optimization problem with the goal of maximizing the system lifetime. Considering that the information is delivered in the form of packets, we identified the problem as an integer programming problem. It is known

The Stable Paths Problem and Interdomain Routing

by Timothy G. Griffin, F. Bruce Shepherd, Gordon Wilfong - IEEE/ACM Transactions on Networking , 2002
"... Abstract—Dynamic routing protocols such as RIP and OSPF essentially implement distributed algorithms for solving the shortest paths problem. The border gateway protocol (BGP) is currently the only interdomain routing protocol deployed in the Internet. BGP does not solve a shortest paths problem sinc ..."
Abstract - Cited by 262 (11 self) - Add to MetaCart
local optimum. We study the stable paths problem using a derived structure called a dispute wheel, representing conflicting routing policies at various nodes. We show that if no dispute wheel can be constructed, then there exists a unique solution for the stable paths problem. We define the simple path

Viceroy: A Scalable and Dynamic Emulation of the Butterfly

by Dahlia Malkhi, Moni Naor, David Ratajczak , 2002
"... We propose a family of constant-degree routing networks of logarithmic diameter, with the additional property that the addition or removal of a node to the network requires no global coordination, only a constant number of linkage changes in expectation, and a logarithmic number with high probabilit ..."
Abstract - Cited by 343 (16 self) - Add to MetaCart
We propose a family of constant-degree routing networks of logarithmic diameter, with the additional property that the addition or removal of a node to the network requires no global coordination, only a constant number of linkage changes in expectation, and a logarithmic number with high

Routing Solutions in Cognitive Radio Network Using Local Network State Information

by Kanchan Hadawale, Sunita Barve
"... Abstract: Cognitive Radio (CR) technology is introduced to solve the problem of spectrum usage inefficiency of wireless networks. CR technology allows sharing of licensed spectrum band in opportunistic and non interfering manner. However it should be aware of spectrum availability and Primary User ( ..."
Abstract - Add to MetaCart
(PU) activities. Routing and spectrum management are the main challenges in Cognitive Radio Network. Here routing challenges and solutions are explained in detail. Spectrum occupancy information maintained at each cognitive user is used for routing decision. With this local information methodologies

QoS-based Routing Solutions for Hybrid SDH-ATM network

by Céline Verdier, Magda Chatzaki, Graham Knight, Rong Shi , 1997
"... Many efforts have been made to manage homogenous B-ISDN networks across multiple domains. However, less effort has been made for hybrid (i.e. ATM and SDH) B-ISDN network management. The ACTS MISA (Management of Integrated SDH and ATM networks) project addresses the issue of hybrid ATM and SDH manage ..."
Abstract - Add to MetaCart
management, aiming to automate the end-to-end GBC (Global Broadband Connectivity) service in the hybrid ATM and SDH network environment by realisation of the Global Broadband Connection Management (GBCM) service according to the TMN management architecture. The routing issue is fundamental to automating GBC
Next 10 →
Results 11 - 20 of 9,057
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University