Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,887,566 papers from all fields of science
Search
Sign In
Create Free Account
Routing
Known as:
External gateway protocol
, Network routing method
, Routing information
Expand
Routing is the process of selecting best paths in a network. Routing is performed for many kinds of networks, including the public switched telephone…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Artificial ants
Bridging (networking)
Chernoff bound
Constraint graph (layout)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Eaack- A Secure Intrusion Detection System for Manets
Dr. K. Selvakumar
,
G. Revathi
,
V. Murugan
2015
Corpus ID: 61491975
Article history: Received 12 October 2014 Received in revised form 26 December 2014 Accepted 1 January 2015 Available online 25…
Expand
Highly Cited
2011
Highly Cited
2011
End-to-end protocols for Cognitive Radio Ad Hoc Networks: An evaluation study
M. D. Felice
,
K. Chowdhury
,
Wooseong Kim
,
A. Kassler
,
L. Bononi
Performance evaluation (Print)
2011
Corpus ID: 17134198
Highly Cited
2008
Highly Cited
2008
Clustering strategies for improving the lifetime of two-tiered sensor networks
A. Bari
,
A. Jaekel
,
S. Bandyopadhyay
Computer Communications
2008
Corpus ID: 29149382
Highly Cited
2007
Highly Cited
2007
An Analytical Performance Model for the Spidergon NoC
M. Moadeli
,
A. Shahrabi
,
W. Vanderbauwhede
,
Partha P. Maji
International Conference on Advanced Information…
2007
Corpus ID: 8745445
Highly Cited
2007
Highly Cited
2007
Tradeoff Between Lifetime and Rate Allocation in Wireless Sensor Networks: A Cross Layer Approach
Junhua Zhu
,
Shan Chen
,
B. Bensaou
,
Ka-Lok Hung
IEEE INFOCOM - 26th IEEE International…
2007
Corpus ID: 2577058
This paper studies the tradeoff between energy consumption and application performance in wireless sensor networks by…
Expand
Highly Cited
2006
Highly Cited
2006
Recovery Policies for Enhancing Web Services Reliability
A. Erradi
,
P. Maheshwari
,
V. Tosic
IEEE International Conference on Web Services…
2006
Corpus ID: 1049373
Web services are gaining acceptance as a standards-based approach for integrating loosely coupled services often distributed over…
Expand
Highly Cited
2003
Highly Cited
2003
On bandwidth efficiency of the hose resource management model in virtual private networks
Alpár Jüttner
,
I. Szabó
,
Áron Szentesi
IEEE INFOCOM . Twenty-second Annual Joint…
2003
Corpus ID: 6276791
The hose resource provisioning model promises to provide an easy-to-use characterization framework for virtual private network…
Expand
Highly Cited
2001
Highly Cited
2001
Overlay Networks A Scalable Alternative for P 2
2001
Corpus ID: 10573364
P eer-to-peer systems are distributed systems that operate without centralized organization or control. To find a particular…
Expand
Highly Cited
1994
Highly Cited
1994
Finding the k Quickset Simple Paths in a Network
Yen-Liang Chen
Information Processing Letters
1994
Corpus ID: 11474311
Highly Cited
1981
Highly Cited
1981
The Multistage Cube: A Versatile Interconnection Network
H. Siegel
,
Robert J. McMillen
Computer
1981
Corpus ID: 12189898
The cube network can support both MIMD and SIMD processing in distributed systems. It allows flexible communications in systems…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required