Sciweavers

1679 search results - page 158 / 336
» CU-Later: a communication system considering time difference
Sort
View
EUROCRYPT
2007
Springer
13 years 12 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
INFOCOM
2003
IEEE
14 years 1 months ago
Exploiting Multiuser Diversity for Medium Access Control in Wireless Networks
— Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that us...
Xiangping Qin, Randall A. Berry
P2P
2010
IEEE
127views Communications» more  P2P 2010»
13 years 6 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
GLOBECOM
2007
IEEE
14 years 2 months ago
Network-Calculus-Based Analysis of Power Management in Video Sensor Networks
— This paper considers two important issues for video sensor network, (1) timely delivery of captured video stream and (2) energy-efficient network design. Based on network calc...
Yanchuan Cao, Yuan Xue, Yi Cui
MDM
2007
Springer
103views Communications» more  MDM 2007»
14 years 2 months ago
Variant Bandwidth Channel Allocation in the Data Broadcasting Environment
Data broadcast is a technique to realize energy saving and bandwidth utilization in a mobile computing environment. However, traditional schemes schedule data items without consid...
Chung-Hua Chu, Hao-Ping Hung, Ming-Syan Chen