Sciweavers

4305 search results - page 219 / 861
» Analysing Protocol Implementations
Sort
View
CSSE
2006
IEEE
13 years 9 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
ITIIS
2008
135views more  ITIIS 2008»
13 years 9 months ago
Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment
The Radio Frequency IDentification (RFID) system is a contactless automatic identification system, which comprises readers and tags. In RFID systems, a reader collision occurs whe...
InChan Song, Xiao Fan, KyungHi Chang
SCN
2008
Springer
13 years 9 months ago
Simplified Submission of Inputs to Protocols
Consider an electronic election scheme implemented using a mix-net; a large number of voters submit their votes and then a smaller number of servers compute the result. The mix-net...
Douglas Wikström
TII
2008
169views more  TII 2008»
13 years 9 months ago
Fine-Tuning MAC-Level Protocols for Optimized Real-Time QoS
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Mathieu Grenier, Nicolas Navet
AAMAS
2004
Springer
13 years 9 months ago
MARP: A Multi-Agent Routing Protocol for Mobile Wireless Ad Hoc Networks
ACT Supporting mobility in a multi hop wireless environment like the MANET still remains a point of research, especially in the context of time-constrained applications. The incapa...
Romit Roy Choudhury, Krishna Paul, Somprakash Band...