To see the other types of publications on this topic, follow the link: Jabber (Computer network protocol).

Journal articles on the topic 'Jabber (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Jabber (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Al-Saadoon, Ghossoon M. W. "A Platform to Develop a Secure Instant Messaging Using Jabber Protocol." Journal of Computer Science 5, no. 9 (September 1, 2009): 661–65. http://dx.doi.org/10.3844/jcssp.2009.661.665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Rajesh. "COMPUTER NETWORK -- APPLICATION LAYER PROTOCOL." International Journal of Advanced Research 4, no. 6 (June 30, 2016): 51–63. http://dx.doi.org/10.21474/ijar01/760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Radia, Perlman. "Network protocol folklore." ACM SIGCOMM Computer Communication Review 49, no. 5 (November 8, 2019): 48–53. http://dx.doi.org/10.1145/3371934.3371953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Neville-Neil, George V. "The network protocol battle." Communications of the ACM 55, no. 4 (April 2012): 27–28. http://dx.doi.org/10.1145/2133806.2133816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Neville-Neil, George V. "The Network Protocol Battle." Queue 10, no. 1 (January 2012): 10–12. http://dx.doi.org/10.1145/2090147.2090149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stenn, Harlan. "Securing network time protocol." Communications of the ACM 58, no. 2 (January 28, 2015): 48–51. http://dx.doi.org/10.1145/2697397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stenn, Harlan. "Securing the Network Time Protocol." Queue 13, no. 1 (December 31, 2014): 20–25. http://dx.doi.org/10.1145/2716276.2717320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mason, Ian A., and Carolyn L. Talcott. "Simple Network Protocol Simulation within Maude." Electronic Notes in Theoretical Computer Science 36 (2000): 274–91. http://dx.doi.org/10.1016/s1571-0661(05)80139-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tu-Chih Tsai. "NETWORK PROTOCOL HANDBOOK [Book Reviews]." IEEE Communications Magazine 34, no. 1 (January 1996): 10. http://dx.doi.org/10.1109/mcom.1996.482238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Edmond, W., K. Leib, and C. Topolcic. "The DARPA wideband network protocol." ACM SIGCOMM Computer Communication Review 20, no. 4 (August 1990): 79–89. http://dx.doi.org/10.1145/99517.99539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hüni, Hermann, Ralph Johnson, and Robert Engel. "A framework for network protocol software." ACM SIGPLAN Notices 30, no. 10 (October 17, 1995): 358–69. http://dx.doi.org/10.1145/217839.217875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lye, KM, L. Chan, and KC Chua. "Performance of a network protocol processor." Computer Communications 17, no. 11 (November 1994): 771–76. http://dx.doi.org/10.1016/0140-3664(94)90061-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Full text
Abstract:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
APA, Harvard, Vancouver, ISO, and other styles
14

Restivo, Ken. "Managing the Multi-protocol, Multi-media Network." International Journal of Network Management 2, no. 2 (June 1992): 68–76. http://dx.doi.org/10.1002/nem.4560020204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cerf, Vinton G., and Robert E. Icahn. "A protocol for packet network intercommunication." ACM SIGCOMM Computer Communication Review 35, no. 2 (April 2005): 71–82. http://dx.doi.org/10.1145/1064413.1064423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hess, David K., David R. Safford, and Udo W. Pooch. "A Unix network protocol security study." ACM SIGCOMM Computer Communication Review 22, no. 5 (October 2, 1992): 24–28. http://dx.doi.org/10.1145/141809.141811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Neufeld, Michael, Ashish Jain, and Dirk Grunwald. "Network Protocol Development with nsclick." Wireless Networks 10, no. 5 (September 2004): 569–81. http://dx.doi.org/10.1023/b:wine.0000036459.40982.ba.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ohta, Hiroji, Yuzuru Johgo, Satoshi Takahashi, Tetsuo Tsuneizumi, Kyoma Suda, Kiyoshi Kubo, Katsuyuki Kawamoto, and Naotaka Miyamura. "Development of a Computer Network Protocol for SCADA Systems." IEEJ Transactions on Power and Energy 115, no. 6 (1995): 638–47. http://dx.doi.org/10.1541/ieejpes1990.115.6_638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Zhi, Chunmiao Yuan, and Na Sun. "Learning Computer Network by Writing Your Own Protocol Analyzer." International Journal of Education and Management Engineering 2, no. 10 (October 29, 2012): 1–8. http://dx.doi.org/10.5815/ijeme.2012.10.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Yujun. "Transport Mechanism Applied to Computer Network Protocol Conformance Testing." Journal of Computer Research and Development 42, no. 1 (2005): 102. http://dx.doi.org/10.1360/crad20050114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Drzymała, Michał, Krzysztof Szczypiorski, and Marek Łukasz Urbański. "Network Steganography in the DNS Protocol." International Journal of Electronics and Telecommunications 62, no. 4 (December 1, 2016): 343–46. http://dx.doi.org/10.1515/eletel-2016-0047.

Full text
Abstract:
Abstract This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
APA, Harvard, Vancouver, ISO, and other styles
22

Zemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Routing Communication Inside Ad Hoc Drones Network." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 17 (September 6, 2021): 192. http://dx.doi.org/10.3991/ijim.v15i17.19179.

Full text
Abstract:
The world knows a constant development of technology applied in different sectors of activities: health, factories, homes, transportation, and others, one of the big axes that take a lot of attention today is the drone’s field. To communicate information a fleet of drones can use different communication architectures: centralized communication architecture, satellite communication architecture, cellular network communication architecture and a specific AdHoc communication architecture called the UAANET drones architecture. In our work we focused specifically on the routing of information inside the UAANET where we analyze and compare the performances of the reactive protocol AODV and the proactive protocol OLSR, when the UAANET use an applications based on the HTTP protocol, the FTP protocol, the database queries, voice application, and video conferencing application.
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Chunxia. "Routing Protocol of Cognitive Ad Hoc Network." International Journal of Future Generation Communication and Networking 8, no. 5 (October 31, 2015): 259–72. http://dx.doi.org/10.14257/ijfgcn.2015.8.5.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
APA, Harvard, Vancouver, ISO, and other styles
25

Yang, Shenghao, and Raymond W. Yeung. "Network Communication Protocol Design from the Perspective of Batched Network Coding." IEEE Communications Magazine 60, no. 1 (January 2022): 89–93. http://dx.doi.org/10.1109/mcom.001.21828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lili Yan, Yan Chang, and Honggang Lin. "Security Analysis of Sensor Network Encryption Protocol." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 10 (May 31, 2013): 1026–32. http://dx.doi.org/10.4156/aiss.vol5.issue10.120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cimet, I. A., and P. R. Srikanta Kumar. "A resilient distributed protocol for network synchronization." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 358–67. http://dx.doi.org/10.1145/1013812.18212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mai, Dinh Loc, and Myung Kyun Kim. "Multi-Hop LoRa Network Protocol with Minimized Latency." Energies 13, no. 6 (March 15, 2020): 1368. http://dx.doi.org/10.3390/en13061368.

Full text
Abstract:
LoRa (Long Range) is a long-range communications capacity with chirp spread spectrum modulation. It has been developed for Internet of Things (IoT) applications for long-distance and low power consumption. Some authors proposed LoRa protocols such as LoRaWAN, LoRaBlink, DQ-LoRa and the multi-hop LoRa network with linear topology; however, these protocols have disadvantages. In this paper, we propose a minimized latency multi-hop LoRa network protocol that is collision-free with low latency to improve on the disadvantages. First, in the proposed protocol, tree topology is constructed by exchanging packets between LoRa nodes and the sink node. During this period, a timeslot and channel are assigned to each tree link, over which LoRa nodes communicate with their parent node and which is collision-free with its neighbor nodes. After the tree construction period, LoRa nodes start data transmission using the timeslot and channel that they have already been assigned to in the tree construction period. We developed the proposed protocol in a LoRa node prototype using the MultiTech mDot module, and we conducted experiments at Ulsan University. The results show that the proposed protocol provides high reliability, parallel transmissions, a minimized number of timeslots assigned for all the links in the network, a minimized packet size, and low latency.
APA, Harvard, Vancouver, ISO, and other styles
29

Wumei, Zhang. "Research of Improved Wireless Sensor Network Routing Protocol." International Journal of Multimedia and Ubiquitous Engineering 10, no. 11 (November 30, 2015): 85–94. http://dx.doi.org/10.14257/ijmue.2015.10.11.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Yang, Zengyin, Hewu Li, Qian Wu, and Jianping Wu. "NPVT: Network Protocol Validation Testbed for Integrated Space-Terrestrial Network." IEEE Access 7 (2019): 46831–45. http://dx.doi.org/10.1109/access.2019.2906397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ahmed, Lubaid, and Abdolreza Abhari. "A multi-agent-based simulator for a transmission control protocol/internet protocol network." SIMULATION 90, no. 5 (April 9, 2014): 511–21. http://dx.doi.org/10.1177/0037549714528268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jain, Neha, Ashish Payal, and Aarti Jain. "Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks." International Journal of Pervasive Computing and Communications 17, no. 4 (September 10, 2021): 361–76. http://dx.doi.org/10.1108/ijpcc-02-2021-0036.

Full text
Abstract:
Purpose The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are the most popular routing protocols, and it has always been a challenge to select between these routing protocols, especially for hybrid networks. The efficiency of routing protocol mainly depends on resulting throughput and delay. Also, it has been observed that data packet size also plays an essential role in determining the efficiency of routing protocol. Design/methodology/approach To analyse the effect of different packet sizes using two routing protocols, routing information protocol (RIP) and open shortest path first (OSPF) on the hybrid network, require detailed planning. Designing the network for simulate and then finally analysing the results requires proper study. Each stage needs to be understood well for work accomplishment. Thus, the network’s simulation and evaluation require implementing the proposed work step by step, saving time and cost. Here, the proposed work methodology is defined in six steps or stages. Findings The simulation results show that both routing protocols – RIP and OSPF are equally good in terms of network throughput for all different packet sizes. However, OSPF performs better in terms of network delay than RIP routing protocol in different packet size scenarios. Research limitations/implications In this paper, a fixed network of 125 objects and only RIP and OSPF routing protocol have been used for analysis. Therefore, in the future, a comparison of different network sizes can be considered by increasing or decreasing the number of objects in the proposed network. Furthermore, the other routing protocols can be used for performance evaluation on the same proposed network. Originality/value The analysis can be conducted by simulation of the network, enabling us to develop a network environment without restricting the selection of parameters as it minimizes cost, network deployment overhead, human resources, etc. The results are analysed, calculated and compared for each packet size on different routing protocol networks individually and the conclusion is made.
APA, Harvard, Vancouver, ISO, and other styles
33

Luo, Junzhou, and Guanqun Gu. "CIMS network protocol and its net models." Journal of Computer Science and Technology 12, no. 5 (September 1997): 476–80. http://dx.doi.org/10.1007/bf02943179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sun, Geng Xin, Feng Jing Shao, and Sheng Bin. "A Inter-Subsystem Private Data Transfer Protocol Based on a New High Secure Computer Architecture." Advanced Materials Research 255-260 (May 2011): 2188–91. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2188.

Full text
Abstract:
Focusing on the characteristics of the new high secure architecture of network computer, an operating system with internal network structure is designed. The operating system contains two subkernels: local kernel and network kernel, the two subkernels run individually in two subsystems. In order to communicate between two subsystems securely, an inter-subsystem private data transfer protocol is proposed and implemented in this paper. The private protocol is a connection-oriented protocol, it can provide reliable end-to-end connectivity Protocol format and protocol connection management based on signature verification are elaborated.
APA, Harvard, Vancouver, ISO, and other styles
35

Das, Ayan Kumar, Rituparna Chaki, and Kashi Nath Dey. "Secure energy efficient routing protocol for wireless sensor network." Foundations of Computing and Decision Sciences 41, no. 1 (March 1, 2016): 3–27. http://dx.doi.org/10.1515/fcds-2016-0001.

Full text
Abstract:
AbstractThe ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack. In this approach one way hash chain is used to reduce the energy drainage. Level based event driven clustering also helps to save energy. The simulation results show that the proposed scheme extends network lifetime even when the cluster based wireless sensor network is under attack.
APA, Harvard, Vancouver, ISO, and other styles
36

Enokido, Tomoya, and Makoto Takizawa. "Autonomic Group Communication Protocol." Journal of Interconnection Networks 04, no. 03 (September 2003): 309–28. http://dx.doi.org/10.1142/s0219265903000891.

Full text
Abstract:
Multiple peer processes are exchanging multimedia messages with each other in a network. An autonomic group protocol supports applications with enough quality of service (QoS) in change of QoS supported by the network and application requirement. An autonomic group service is supported for applications by cooperation of multiple autonomous agents. Each agent autonomously takes a class of each protocol function like retransmission. Classes taken by an agent are required to be consistent with but might be different from the others. A group is composed of views in each of which agents autonomously take protocol classes consistent with each other. We discuss a model of autonomic group protocol and present how to autonomously change retransmission ways in a group.
APA, Harvard, Vancouver, ISO, and other styles
37

Li, Yizhi. "Research on Data Confidentiality and Security Protocol in Computer Network." Journal of Physics: Conference Series 1648 (October 2020): 032180. http://dx.doi.org/10.1088/1742-6596/1648/3/032180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

de Cola, Tomaso, Alberto Ginesi, Giovanni Giambene, George C. Polyzos, Vasilios A. Siris, Nikos Fotiou, and Yiannis Thomas. "Network and Protocol Architectures for Future Satellite Systems." Foundations and Trends® in Networking 12, no. 1-2 (2017): 1–161. http://dx.doi.org/10.1561/1300000046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Huang, Scott C. H., Maggie X. Cheng, and Ding-Zhu Du. "GeoSENS: geo-based sensor network secure communication protocol." Computer Communications 29, no. 4 (February 2006): 456–61. http://dx.doi.org/10.1016/j.comcom.2004.12.030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Park, Hyung-Soo, Hyung-Woo Lee, Dong Hoon Lee, and Hong-Ki Ko. "Multi-protocol authentication for SIP/SS7 mobile network." Computer Communications 31, no. 11 (July 2008): 2755–63. http://dx.doi.org/10.1016/j.comcom.2008.02.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Wu, Shengyao, Xiaojun Wang, Mingming Wang, Zhiguo Qu, and Zhexi Zhang. "Continuous-variable quantum network coding protocol based on butterfly network model." International Journal of Sensor Networks 32, no. 2 (2020): 69. http://dx.doi.org/10.1504/ijsnet.2020.10026660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Qu, Zhiguo, Zhexi Zhang, Mingming Wang, Shengyao Wu, and Xiaojun Wang. "Continuous-variable quantum network coding protocol based on butterfly network model." International Journal of Sensor Networks 32, no. 2 (2020): 69. http://dx.doi.org/10.1504/ijsnet.2020.104922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Fulin. "Application of Artificial Intelligence Technology in Computer Network Security Communication." Journal of Control Science and Engineering 2022 (July 21, 2022): 1–6. http://dx.doi.org/10.1155/2022/9785880.

Full text
Abstract:
In order to cope with the frequent challenges of network security issues, a method of applying artificial intelligence technology to computer network security communication is proposed. First, within the framework of computer network communication, an intelligent protocol reverse analysis method is proposed. By converting the protocol into an image and establishing a convolutional neural network model, artificial intelligence technology is used to map the data to the protocol result. Finally, use the model to test the test data to adjust the model parameters and optimize the model as much as possible. The experimental results show that compared with the test model, the results obtained after training with the deep convolutional neural network model in this paper have increased the accuracy by 2.4%, reduced the loss by 38.2%, and reduced the running time by 42 times. The correctness and superiority of the algorithm and model are verified.
APA, Harvard, Vancouver, ISO, and other styles
44

Quan-Hai Wang, Quan-Hai Wang, Shao-Feng Lan Quan-Hai Wang, Jing Feng Shao-Feng Lan, Yi-Qun Wang Jing Feng, and Wen-Bai Chen Yi-Qun Wang. "Improvement and Optimization of a Mobile Multi-agent AODV Routing Protocol." 電腦學刊 33, no. 4 (August 2022): 205–13. http://dx.doi.org/10.53106/199115992022083304017.

Full text
Abstract:
<p>In the scenario of node failure in mobile multi-agent, Ad hoc On-demand Distance Vector (AODV) rout-ing protocol fails in network information transmission due to the damage of communication link. In addi-tion, the existing AODV multipath routing protocol node load balancing mechanism is imperfect. In order to solve the low network survivability caused by the above problems, an improved responsive multipath routing protocol MD_AODV (Multipath Destroy-resistance AODV) is proposed. The protocol is opti-mized in three aspects: multi-channel concurrency mechanism, node load balancing mechanism and shortest path maintenance mechanism. The simulation analysis of the modified AODV multipath routing protocol is realized on OPNENT simulation platform. The simulation results show that compared with AODV protocol, the improved multipath routing protocol can enhance the utilization of network re-sources and has better link redundancy. Moreover, the modified routing protocol not only enhances the reliability and fault tolerance of the path, but also increases the network aggregation bandwidth. </p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
45

Husieen, Naseer Ali, Suhaidi Hassan, Osman Ghazali, and Lelyzar Siregar. "The Robustness of RM-DSR Multipath Routing Protocol with Different Network Size in MANET." International Journal of Mobile Computing and Multimedia Communications 5, no. 2 (April 2013): 46–57. http://dx.doi.org/10.4018/jmcmc.2013040104.

Full text
Abstract:
This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol (RM-DSR) protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of RM-DSR protocol is tested in the Network Simulator (NS-2.34) under the random way point mobility model with varying number of mobile nodes. The network size parameter is used to investigate the robustness and the efficiency of RM-DSR protocol compared to DSR protocol. The network size affects the time of the route discovery process during the route establishment and the route maintenance process which could influence the overall performance of the routing protocol. The simulation results indicate that RM-DSR outperforms DSR in terms of the packet delivery ratio, routing overhead, end-to-end delay, normalized routing load and packet drop.
APA, Harvard, Vancouver, ISO, and other styles
46

Yu, Yingchao, Zuoning Chen, Shuitao Gan, and Xiaofeng Wang. "SGPFuzzer: A State-Driven Smart Graybox Protocol Fuzzer for Network Protocol Implementations." IEEE Access 8 (2020): 198668–78. http://dx.doi.org/10.1109/access.2020.3025037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gao, Yuefei, Shin Kawai, and Hajime Nobuhara. "Scalable Blockchain Protocol Based on Proof of Stake and Sharding." Journal of Advanced Computational Intelligence and Intelligent Informatics 23, no. 5 (September 20, 2019): 856–63. http://dx.doi.org/10.20965/jaciii.2019.p0856.

Full text
Abstract:
Blockchain – a distributed and public database of transactions – has become a platform for decentralized applications. Despite its increasing popularity, blockchain technology faces a scalability problem: the throughput does not scale with the increasing network size. Thus, in this paper, we propose a scalable blockchain protocol to solve the scalability problem. The proposed method was designed based on a proof of stake (PoS) consensus protocol and a sharding protocol. Instead of transactions being processed by the whole network, the sharding protocol is employed to divide unconfirmed transactions into transaction shards and to divide the network into network shards. The network shards process the transaction shards in parallel to produce middle blocks. Middle blocks are then combined into a final BLOCK in a timestamp recorded on the blockchain. Experiments were performed in a simulation network consisting of 100 Amazon EC2 instances. The latency of the proposed method was approximately 27 s and the maximum throughput achieved was 36 transactions per second for a network containing 100 nodes. The results of the experiments indicate that the throughput of the proposed protocol increases with the network size. This confirms the scalability of the proposed protocol.
APA, Harvard, Vancouver, ISO, and other styles
48

Chaoyi Zhang, Jingfang Su, and Muqing Wu. "Fixed Relay Random Access Protocol for Cooperative Network." International Journal of Digital Content Technology and its Applications 5, no. 5 (May 31, 2011): 157–65. http://dx.doi.org/10.4156/jdcta.vol5.issue5.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wu Boqiao, Liu Xuefei, Tan Aiping, and Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Honda, Michio, Felipe Huici, Costin Raiciu, Joao Araujo, and Luigi Rizzo. "Rekindling network protocol innovation with user-level stacks." ACM SIGCOMM Computer Communication Review 44, no. 2 (April 8, 2014): 52–58. http://dx.doi.org/10.1145/2602204.2602212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography