Proposition and validation of an original MAC layer with simultaneous medium accesses for low latency wireless control/command applications
Proposition of a full deterministic medium access method for wireless network in a robotic application
PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies
Protecting infrastructure networks from cost-based attacks
Protecting Public-Access Sites Against Distributed Denial-of-Service Attacks
Protection from Unresponsive Flows with Geometric CHOKe
Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network
Provide a Model for Handover Technology in Wireless Networks
Providing content based billing architecture over Next Generation Network
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks over Unreliable Channels
Providing Rate Guarantees to TCP over the ATM GFR Service
Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing
PSA: The Packet Scheduling Algorithm for Wireless Sensor Networks
PSIM: A tool for analysis of device pairing methods
Push & Pull: autonomous deployment of mobile sensors for a complete coverage
Push vs. Pull in Web-Based Network Management
Push-and-Track: Saving Infrastructure Bandwidth Through Opportunistic Forwarding
Pushing BitTorrent Locality to the Limit
Pushing BitTorrent Locality to the Limit