Sciweavers

3972 search results - page 9 / 795
» Design of the iSCSI Protocol
Sort
View
ENTCS
2007
145views more  ENTCS 2007»
13 years 7 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...
FOCS
2010
IEEE
13 years 5 months ago
On the Computational Complexity of Coin Flipping
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a coin flipping protocol should guarantee both (1) Completeness: an honest executi...
Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
IJSNET
2010
143views more  IJSNET 2010»
13 years 6 months ago
Multi-radio medium access control protocol for wireless sensor networks
— In this paper, we propose a new dual radio medium access control (MAC) protocol for wireless sensor networks. Our MAC protocol design combines the advantages of low and high fr...
Junaid Ansari, Xi Zhang, Petri Mähönen
TC
1998
13 years 7 months ago
Design Verification of the S3.mp Cache-Coherent Shared-Memory System
—This paper describes the methods used to formulate and validate the memory subsystem of the cache-coherent Sun Scalable emory MultiProcessor (S3.mp) at three levels of abstracti...
Fong Pong, Michael C. Browne, Gunes Aybay, Andreas...
CN
2011
117views more  CN 2011»
13 years 2 months ago
Cross-layer design in multihop wireless networks
In this paper, we take a holistic approach to the protocol architecture design in multihop wireless networks. Our goal is to integrate various protocol layers into a rigorous fram...
Lijun Chen, Steven H. Low, John C. Doyle