Sciweavers

672 search results - page 17 / 135
» Analysis and applications of timed service protocols
Sort
View
AFRICACRYPT
2009
Springer
14 years 3 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
GLOBECOM
2010
IEEE
13 years 6 months ago
Energy-Aware Real-Time Opportunistic Routing for Wireless Ad Hoc Networks
Existing studies on the design of routing protocols for wireless ad hoc networks mainly focused on energy efficiency. However, in many real-time applications such as target trackin...
Wei Yang, Weifa Liang, Wenhua Dou
HOTOS
1997
IEEE
14 years 1 months ago
What Synchronous Groupware Needs: Notification Services
Synchronous groupware is the class of applications in which two or more people collaborate in what they perceive to be real time. Most previous efforts to deploy synchronous group...
Mark Day
PERCOM
2005
ACM
14 years 8 months ago
Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks
This paper considers the problem of maintaining the coverage degree of a wireless sensor network at an application specific level while keeping the sensing units of only a subset o...
Hasan Çam, Hidayet Ozgur Sanli
JCM
2006
126views more  JCM 2006»
13 years 8 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...