Sciweavers

402 search results - page 49 / 81
» Achieving privacy in mesh networks
Sort
View
HPCA
2009
IEEE
14 years 9 months ago
Elastic-buffer flow control for on-chip networks
This paper presents elastic buffers (EBs), an efficient flow-control scheme that uses the storage already present in pipelined channels in place of explicit input virtualchannel b...
George Michelogiannakis, James D. Balfour, William...
ICDCS
2002
IEEE
14 years 1 months ago
A Reliable Multicast Algorithm for Mobile Ad Hoc Networks
: A reliable multicast algorithm, called RMA, for mobile ad hoc networks is presented that is based on a new cost criterion, called link lifetime, for determining the optimal path ...
Thiagaraja Gopalsamy, Mukesh Singhal, Dhabaleswar ...
DSN
2007
IEEE
14 years 3 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
ICITS
2009
13 years 6 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
PAM
2007
Springer
14 years 3 months ago
Implications of Power Control in Wireless Networks: A Quantitative Study
Abstract. The use of power control in wireless networks can lead to two conflicting effects. An increase in the transmission power on a link may (i) improve the quality and thus t...
Ioannis Broustis, Jakob Eriksson, Srikanth V. Kris...