Sciweavers

672 search results - page 72 / 135
» Analysis and applications of timed service protocols
Sort
View
SEC
2008
13 years 10 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
CONEXT
2006
ACM
14 years 2 months ago
Compositional control of IP media
Abstract— In many IP media services, the media channels are point-to-point, dynamic, and set up with the participation of one or more application servers, even though the media p...
Pamela Zave, Eric Cheung
VTC
2010
IEEE
107views Communications» more  VTC 2010»
13 years 7 months ago
Contention-Based Neighborhood Estimation
—This paper proposes a probabilistic technique that enables a node to estimate the number of its neighbors that fulfill certain criteria. The technique does not require any a pr...
Helmut Adam, Evsen Yanmaz, Wilfried Elmenreich, Ch...
PADS
1999
ACM
14 years 1 months ago
Shock Resistant Time Warp
In an attempt to cope with time-varying workload, traditional adaptive Time Warp protocols are designed to react in response to performance changes by altering control parameter c...
Alois Ferscha, James Johnson
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 3 months ago
Performance Measurement, Evaluation and Analysis of Push-to-Talk in 3G Networks
— Push-to-talk over Cellular (PoC) is considered as one of important applications in Next Generation Networks (NGN). The main objective of this study is to investigate the perfor...
Wei-Peng Chen, Steven Licking, Takashi Ohno, Satos...