Sciweavers

2162 search results - page 148 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
TWC
2008
124views more  TWC 2008»
13 years 10 months ago
On the Performance of Distributed Polling Service-based Medium Access Control
It has been shown in the literature that many MAC protocols for wireless networks have a considerable control overhead, which limits their achievable throughput and delay performan...
Yihan Li, Shiwen Mao, Shivendra S. Panwar, Scott F...
INFOCOM
2010
IEEE
13 years 8 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang
P2P
2010
IEEE
187views Communications» more  P2P 2010»
13 years 8 months ago
Do BitTorrent-Like VoD Systems Scale under Flash-Crowds?
—The efficiency of BitTorrent for file sharing has inspired a number of BitTorrent-based P2P protocols for Videoon-Demand (VoD). It has been shown that these systems are scalab...
Lucia D'Acunto, Tamas Vinko, Johan A. Pouwelse
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 8 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
TCOM
2010
144views more  TCOM 2010»
13 years 8 months ago
Transmission Radius Control in Wireless Ad Hoc Networks with Smart Antennas
—In this paper, we present a model to analyze the performance of three transmission strategies with smart antennas, i.e. directional antennas with adjustable transmission power. ...
Fei Huang, Ka-Cheong Leung, Victor O. K. Li