Sciweavers

652 search results - page 106 / 131
» Delay Analysis of Aloha Network
Sort
View
ADT
2010
13 years 8 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
ICRA
2003
IEEE
154views Robotics» more  ICRA 2003»
14 years 1 months ago
Scalability and schedulability in large, coordinated, distributed robot systems
— Multiple, independent robot platforms promise significant advantage with respect to robustness and flexibility. However, coordination between otherwise independent robots req...
John Sweeney, Huan Li, Roderic A. Grupen, Krithi R...
CCS
2008
ACM
13 years 9 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
14 years 2 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
COMCOM
2006
178views more  COMCOM 2006»
13 years 7 months ago
SIP-based MIP6-MANET: Design and implementation of mobile IPv6 and SIP-based mobile ad hoc networks
In this paper, we designed and implemented an integrated wireless system, namely a SIP-based MIP6-MANET system. This SIP-based MIP6MANET system is an integration and implementatio...
Yuh-Shyan Chen, Yun-Hsuan Yang, Ren-Hung Hwang