Sciweavers

3972 search results - page 189 / 795
» Design of the iSCSI Protocol
Sort
View
WOTE
2010
15 years 2 months ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 2 months ago
Starburst SSD: An Efficient Protocol for Selective Dissemination
Abstract--We present Starburst, a routing-based protocol designed to efficiently disseminate data items to small subsets within a sensor network. Starburst constructs a routing hie...
Tahir Azim, Qasim Mansoor, Philip Levis
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 11 months ago
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks
—In this paper the performance of unslotted ALOHA and CSMA are analyzed in spatially distributed wireless networks. Users/packets arrive randomly in space and time according to a...
Mariam Kaynia, Nihar Jindal
PDCAT
2005
Springer
15 years 10 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
135
Voted
UM
2001
Springer
15 years 9 months ago
Perceptual Considerations for Quality of Service Management: An Integrated Architecture
In this paper, we suggest an integrated architecture that makes use of the objective-technical information provided by the designer and the subjectiveperceptual information supplie...
George Ghinea, George D. Magoulas