Sciweavers

330 search results - page 25 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols
Database replication based on group communication systems has recently been proposed as an efficient and resilient solution for large-scale data management. However, its evaluati...
A. Sousa, José Pereira, L. Soares, Alfr&aci...
WCNC
2010
IEEE
14 years 20 days ago
A Reliable Energy-Efficient 802.15.4-Based MAC Protocol for Wireless Sensor Networks
—The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general c...
Yasser Gadallah, Mariam Jaafari
ICPADS
2002
IEEE
14 years 1 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
DANCE
2002
IEEE
14 years 1 months ago
Active Network Monitoring and Control: The SENCOMM Architecture and Implementation
We present the architecture, design, and implementation of a Smart Environment for Network Control, Monitoring and Management (SENCOMM). SENCOMM uses active network technology to ...
Alden W. Jackson, James P. G. Sterbenz, Matthew Co...
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao