Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,252,471 papers from all fields of science
Search
Sign In
Create Free Account
Time to live
Known as:
Time-to-live
, Ping TTL
, Hop limit
Expand
Time to live (TTL) or hop limit is a mechanism that limits the lifespan or lifetime of data in a computer or network. TTL may be implemented as a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Broadcast radiation
Cache (computing)
Cache invalidation
Captive portal
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Contact expectation based routing for delay tolerant networks
Honglong Chen
,
W. Lou
Ad hoc networks
2016
Corpus ID: 43253814
2012
2012
Fair content dissemination in participatory DTNs
A. Mashhadi
,
Sonia Ben Mokhtar
,
L. Capra
Ad hoc networks
2012
Corpus ID: 1398379
Highly Cited
2011
Highly Cited
2011
TTL based routing in opportunistic networks
Anindya Tahsin Prodhan
,
R. Das
,
M. Kabir
,
G. Shoja
Journal of Network and Computer Applications
2011
Corpus ID: 5401882
Highly Cited
2006
Highly Cited
2006
Covert channels in the IP time to live field
S. Zander
,
G. Armitage
,
P. Branch
2006
Corpus ID: 16273659
Covert channels are used for the secret transfer of information. Unlike encryption, which only protects the information from…
Expand
Highly Cited
2005
Highly Cited
2005
Delay Tolerant Mobile Networks (DTMNs): Controlled Flooding in Sparse Mobile Networks
Khaled A. Harras
,
K. Almeroth
,
E. Belding-Royer
NETWORKING
2005
Corpus ID: 6633148
The incredible growth in the capabilities and functionality of mobile devices has enabled new applications to emerge. Due to the…
Expand
Highly Cited
2004
Highly Cited
2004
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
F. Kargl
,
A. Klenk
,
S. Schlott
,
M. Weber
European Workshop on Security in Ad-hoc and…
2004
Corpus ID: 17567258
The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the…
Expand
Highly Cited
2004
Highly Cited
2004
Throughput-delay analysis of mobile ad-hoc networks with a multi-copy relaying strategy
R. M. D. Moraes
,
H. Sadjadpour
,
J. Garcia-Luna-Aceves
First Annual IEEE Communications Society…
2004
Corpus ID: 14893463
Multiuser diversity has been shown to increase the throughput of mobile ad-hoc wireless networks (MANET) when compared to fixed…
Expand
Highly Cited
2003
Highly Cited
2003
Bounds on Linear Codes for Network Multicast
M. Feder
,
D. Ron
,
A. Tavory
Electron. Colloquium Comput. Complex.
2003
Corpus ID: 454553
Traditionally, communication networks are composed of routing nodes, which relay and duplicate data. Work in recent years has…
Expand
Highly Cited
2001
Highly Cited
2001
Soft ARQ for Layered Streaming Media
Matthew Podolsky
,
S. McCanne
,
M. Vetterli
J. VLSI Signal Process.
2001
Corpus ID: 17086284
A growing and important class of traffic in the Internet is so-called “streaming media,” in which a server transmits a packetized…
Expand
Highly Cited
1994
Highly Cited
1994
An optimal spare-capacity assignment model for survivable networks with hop limits
M. Herzberg
,
S. J. Bye
IEEE GLOBECOM. Communications: The Global Bridge
1994
Corpus ID: 60749816
The paper presents a new algorithm for spare-capacity assignment in survivable networks which use cross-connect systems as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE