Sciweavers

3938 search results - page 143 / 788
» Interactive Protocols on the Reals
Sort
View
144
Voted
MSWIM
2005
ACM
15 years 9 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
120
Voted
DALT
2006
Springer
15 years 7 months ago
Dynamic Model Checking for Multi-agent Systems
Abstract. This paper is concerned with the problem of obtaining predictable interactions between groups of agents in open environments when individual agents do not expose their bd...
Nardine Osman, David Robertson, Christopher Walton
PERCOM
2006
ACM
16 years 3 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
HCI
2001
15 years 5 months ago
Human-computer protocols
s, covering different levels of abstraction over the information exchanged. As the protocol is layered, we can discuss interaction in terms of different levels of granularity, bett...
David J. Duke, David A. Duce, Philip J. Barnard, J...
152
Voted
ICECCS
2009
IEEE
156views Hardware» more  ICECCS 2009»
15 years 1 months ago
Energy Efficient Duty Allocation Protocols for Wireless Sensor Networks
Wireless sensor networks require shared medium access management to prevent collisions, message corruption and other unhelpful effects. Cellular sensornets require minimal energy ...
Jonathan Tate, Iain Bate