Sciweavers

525 search results - page 44 / 105
» A Fair e-Tendering Protocol
Sort
View
ICNSC
2007
IEEE
14 years 2 months ago
Queue Length Based Internet Congestion Control
— In this paper we present new queue length based Internet congestion control protocol which is shown through simulations to work effectively. The control objective is to regulat...
Marios Lestas, Andreas Pitsillides, Petros A. Ioan...
TVLSI
2011
216views more  TVLSI 2011»
13 years 2 months ago
Energy and Performance Models for Synchronous and Asynchronous Communication
—Communication costs, which have the potential to throttle design performance as scaling continues, are mathematically modeled and compared for various pipeline methodologies. Fi...
Kenneth S. Stevens, Pankaj Golani, Peter A. Beerel
INFOCOM
2005
IEEE
14 years 1 months ago
A QoS-aware AIMD protocol for time-sensitive applications in wired/wireless networks
Abstract— A TCP-friendly Additive Increase and Multiplicative Decrease (AIMD) protocol is proposed to support timesensitive applications in hybrid wired/wireless networks. By ana...
Lin Cai, Xuemin Shen, Jon W. Mark, Jianping Pan
PADS
2004
ACM
14 years 1 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
CCS
2005
ACM
14 years 1 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin