Sciweavers

234 search results - page 14 / 47
» An Analysis of Multiple Tutoring Protocols
Sort
View
NETWORKING
2007
13 years 9 months ago
Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may ge...
Ahmad Al Hanbali, Arzad Alam Kherani, Philippe Nai...
JSAC
2011
127views more  JSAC 2011»
13 years 2 months ago
Opportunistic Multiple Access for Cognitive Radio Networks
—In this paper, opportunistic multiple access to the under-utilized channel resources is investigated. Exploiting source burstiness, secondary cognitive nodes utilizes primary no...
Amr A. El-Sherif, Ahmed K. Sadek, K. J. Ray Liu
TWC
2008
106views more  TWC 2008»
13 years 7 months ago
Cooperative communications protocol for multiuser OFDM networks
This paper proposes a relay-based scheme where a fixed number of relays are utilized to design an OFDM cooperative protocol. By exploiting limited feedback from the destination ter...
W. Pam Siriwongpairat, Ahmed K. Sadek, K. J. Ray L...
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
WS
2005
ACM
14 years 1 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...