Sciweavers

234 search results - page 5 / 47
» An Analysis of Multiple Tutoring Protocols
Sort
View
SEC
2007
13 years 9 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
ICC
2007
IEEE
14 years 2 months ago
A Multilink Protocol with the Per Flow Resequencing and Its Performance Evaluation
Abstract— Procedures that provide a virtual link service aggregating bandwidths of multiple physical links are called a multilink protocol. The multilink protocol enables to util...
Toshihiro Shikama, Takashi Watanabe, Tadanori Mizu...
TON
2012
11 years 10 months ago
A Transport Protocol to Exploit Multipath Diversity in Wireless Networks
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shi...
IROS
2006
IEEE
115views Robotics» more  IROS 2006»
14 years 1 months ago
An Analysis of Random Peer-to-Peer Communication for System-Level Coordination in Decentralized Multiple-Robot Systems
— Inter-robot communication is essential if general purpose intelligent decentralized multiple-robot systems are to become a reality. Traditionally, explicit communication amongs...
Chris A. C. Parker, Hong Zhang
ESEM
2009
ACM
14 years 2 months ago
Cognitive factors in perspective-based reading (PBR): A protocol analysis study
The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the proto...
Bryan Robbins, Jeff Carver