Sciweavers

4305 search results - page 210 / 861
» Analysing Protocol Implementations
Sort
View
ANCS
2010
ACM
13 years 6 months ago
Airblue: a system for cross-layer wireless protocol development
Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols...
Man Cheuk Ng, Kermin Elliott Fleming, Mythili Vutu...
PERCOM
2006
ACM
14 years 8 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
ICS
2010
Tsinghua U.
14 years 6 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
ICC
2009
IEEE
14 years 4 months ago
HELP: // Hypertext In-Emergency Leveraging Protocol
—This paper proposes HELP://, a simple light-weight protocol that runs over HTTP and is used to disseminate information from a server(s) to its clients during the time of a crisi...
Mina Guirguis, Hideo Goto
INFOCOM
2008
IEEE
14 years 3 months ago
DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile Networks
—The publish/subscribe (pub/sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extending a pub/sub system in ...
Quan Yuan, Jie Wu