Sciweavers

2500 search results - page 183 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
109
Voted
ASIACRYPT
1999
Springer
15 years 8 months ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang
CONEXT
2007
ACM
15 years 7 months ago
Application and desktop sharing
Application and desktop sharing allows sharing any application with one or more people over the Internet. The participants receive the screen-view of the shared application from t...
Omer Boyaci, Henning Schulzrinne
78
Voted
WIOPT
2010
IEEE
15 years 2 months ago
Field measurements of 802.11 collision, noise and hidden-node loss rates
—In this paper we present the first field measurements taken using a new approach proposed in [1] for measuring link impairments in 802.11 WLANs. This uses a sender-side MAC/PH...
Douglas J. Leith, David Malone
150
Voted
ADHOC
2006
155views more  ADHOC 2006»
15 years 3 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
123
Voted
SECON
2008
IEEE
15 years 10 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...