• Publications
  • Influence
AMRoute: Ad Hoc Multicast Routing Protocol
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical cores. It creates aExpand
  • 516
  • 30
Fast routing table lookup using CAMs
The authors investigate fast routing table lookup techniques, where the table is composed of hierarchical addresses such as those found in a national telephone network. The hierarchical addressesExpand
  • 311
  • 8
Reliable broadband communication using a burst erasure correcting code
Traditionally, a transport protocol corrects errors in a computer communication network using a simple ARQ protocol. With the arrival of broadband networks, forward error correction is desirable as aExpand
  • 222
  • 8
AMRoute: Adhoc Multicast Routing Protocol
  • 194
  • 6
Four State Asynchronous Architectures
  • A. McAuley
  • Computer Science
  • IEEE Trans. Computers
  • 1 February 1992
An approach is presented to high-performance asynchronous architectures offering significant advantages over conventional clocked systems, without some of the drawbacks normally associated withExpand
  • 44
  • 5
Protocol boosters
This paper describes a new methodology for protocol design, using incremental construction of the protocol from elements called "protocol boosters" on an as-needed basis. Protocol boosters allow: (1)Expand
  • 131
  • 3
Dynamic service negotiation protocol (DSNP) and wireless DiffServ
This paper presents the design principles of dynamic service negotiation protocol (DSNP). DSNP is a protocol to negotiate the SLS (service level specification) in the IP layer. It can be used forExpand
  • 52
  • 3
Ad-hoc Multicast Routing Protocol
  • 23
  • 3
Autoconfiguration, registration, and mobility management for pervasive computing
In the vision of pervasive computing, users will exchange information and control their environments from anywhere using various wireline/wireless networks and computing devices. We believe thatExpand
  • 121
  • 2
A stochastic approximation approach for improving intrusion detection data fusion structures
A variety of attacks on MANET routing, forwarding, and infrastructure protocols can only be detected using distributed cooperative algorithms. One promising strategy is to organize cooperativeExpand
  • 17
  • 2