Sciweavers

49 search results - page 8 / 10
» Adaptation of TURN protocol to SIP protocol
Sort
View
JSAC
2010
142views more  JSAC 2010»
13 years 2 months ago
Handling inelastic traffic in wireless sensor networks
The capabilities of sensor networking devices are increasing at a rapid pace. It is therefore not impractical to assume that future sensing operations will involve real time (inela...
Jiong Jin, Avinash Sridharan, Bhaskar Krishnamacha...
WISES
2008
13 years 9 months ago
Establishing wireless time-triggered communication using a firefly clock synchronization approach
In South-East Asia, huge swarms of fireflies synchronously emit light flashes to attract mating partners. The underlying principle can be used to implement a robust and scalable d...
Robert Leidenfrost, Wilfried Elmenreich
TSP
2008
83views more  TSP 2008»
13 years 7 months ago
Bit and Power Allocation for Goodput Optimization in Coded Parallel Subchannels With ARQ
Abstract--This paper addresses the problem of adaptively allocating the bits and the power among a set of parallel subchannels. A frame-oriented transmission with convolutional cod...
B. Devillers, Jérôme Louveaux, Luc Va...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 8 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
ICALP
2010
Springer
14 years 10 days ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao