Sciweavers

3972 search results - page 41 / 795
» Design of the iSCSI Protocol
Sort
View
IADIS
2004
13 years 9 months ago
Voting with Designated Verifier Signature-Like Protocol
We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other u...
Emmanuel Dall'Olio, Olivier Markowitch
GLOBECOM
2007
IEEE
14 years 2 months ago
The Design and Analysis of Protocol Sequences for Robust Wireless Accessing
Abstract—In this paper, a family of linear congruence sequences with interesting cross-correlation properties is investigated for potential applications in defining new multiple...
Chung Shue Chen, Wing Shing Wong, Yeqiong Song
IPPS
2006
IEEE
14 years 1 months ago
A design of overlay anonymous multicast protocol
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...
WCE
2007
13 years 9 months ago
System Design and Networking Protocols for Wireless Positioning
Abstract—The recent boom in wireless communications has led to a wide range of new applications. Wireless positioning is an emerging technology which can provide accurate locatio...
Bo Peng, Andrew H. Kemp, Washington Ochieng
FMSD
2006
183views more  FMSD 2006»
13 years 7 months ago
An algebraic theory for behavioral modeling and protocol synthesis in system design
The design productivity gap has been recognized by the semiconductor industry as one of the major threats to the continued growth of system-on-chips and embedded systems. Ad-hoc sy...
Jean-Pierre Talpin, Paul Le Guernic