نتایج جستجو برای: probabilistic epidemic forwarding

تعداد نتایج: 121643  

2015
Seung Deok Han Yun Won Chung

In delay tolerant network (DTN), an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destina...

Journal: :Computer Networks 2007
Jianhong Xia Lixin Gao Teng Fei

In this paper, we present a measurement study of persistent forwarding loops and a flooding attack that exploits persistent forwarding loops. Persistent forwarding loops may share one or more links with forwarding paths to some hosts. An attacker can exploit persistent forwarding loops to overload the shared links and disrupt Internet connectivity to those hosts. To understand the extent of thi...

Journal: :IEEE Internet Computing 2018

Journal: :Trends in Plant Science 2018

Journal: :Vehicular Communications 2015
Pierpaolo Salvo Francesca Cuomo Andrea Baiocchi Izhak Rubin

a r t i c l e i n f o a b s t r a c t The use of Vehicular Ad-Hoc Networks (VANETs) for the dissemination of data flows to mobile highway vehicles has gained recently attention. For this purpose, vehicle-to-vehicle multi-hop communications are employed. For the effective networking of packets among highway vehicles, it is necessary to implement efficient algorithms that vehicles use to elect th...

Journal: :journal of computer and robotics 0
mehdi keshavarz department of electrical, computer & it, islamic azad university of qazvin, qazvin, iran

the establishment as well as the survival of mobile ad-hoc networks relies on the cooperation of nodes for performing network operations such as routing and packet forwarding. in these networks, misbehaving nodes can severely degrade network’s performance by not cooperating in networking operations. in this paper, we study the issue of node misbehavior in packet forwarding. to counter this type...

Journal: :journal of advances in computer research 0

the ip lookup process is a key bottleneck in routing due to the increase in routing table size, increasing traıc and migration to ipv6 addresses. the ip address lookup involves computation of the longest prefix matching (lpm), which existing solutions such as bsd radix tries, scale poorly when traıc in the router increases or when employed for ipv6 address lookups. in this paper, we describe a ...

Journal: :iranian journal of public health 0
m.emami m.moghadami

twenty patients, a family, their neighbors, and friends; with lesions suspicious of ringworm infection, were referred to us within a period of 80 days. the source of infection was found to be 3 persian cats (a mother and two kittens) living with the family. the cats had multiple lesions around their nose and on abdomen which reveales the prevalence of cutaneous fungi both on direct microscopic ...

Journal: :international journal of endocrinology and metabolism 0
zahra nozhat cellular and molecular endocrine research center, research institute for endocrine sciences, shahid beheshti university of medical sciences, tehran, ir iran mehdi hedayati cellular and molecular endocrine research center, research institute for endocrine sciences, shahid beheshti university of medical sciences, tehran, ir iran feridoun azizi endocrine research center, research institute for endocrine sciences, shahid beheshti university of medical sciences, tehran, ir iran; endocrine research center, research institute for endocrine sciences, shahid beheshti university of medical sciences, tehran, ir iran.

2003
José Orlando Pereira Luís E. T. Rodrigues M. João Monteiro Rui Carlos Oliveira Anne-Marie Kermarrec

Epidemic, or probabilistic, multicast protocols have emerged as a viable mechanism to circumvent the scalability problems of reliable multicast protocols. However, most existing epidemic approaches use connectionless transport protocols to exchange messages and rely on the intrinsic robustness of the epidemic dissemination to mask network omissions. Unfortunately, such an approach is not networ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید