Sciweavers

2699 search results - page 395 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
JSAC
2011
184views more  JSAC 2011»
13 years 5 months ago
Goodput Enhancement of VANETs in Noisy CSMA/CA Channels
— The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportatio...
Yusun Chang, Christopher P. Lee, John A. Copeland
MOBIHOC
2008
ACM
14 years 9 months ago
Delay-bounded routing in vehicular ad-hoc networks
Ad hoc networks formed by traveling vehicles are envisaged to become a common platform that will support a wide variety of applications, ranging from road safety to advertising an...
Antonios Skordylis, Niki Trigoni
IAT
2009
IEEE
14 years 5 months ago
Topology and Memory Effect on Convention Emergence
Abstract—Social conventions are useful self-sustaining protocols for groups to coordinate behavior without a centralized entity enforcing coordination. We perform an in-depth stu...
Daniel Villatoro, Sandip Sen, Jordi Sabater-Mir
ICRA
2009
IEEE
197views Robotics» more  ICRA 2009»
14 years 4 months ago
Synchronous EEG brain-actuated wheelchair with automated navigation
Abstract— This paper describes a new non-invasive brainactuated wheelchair that relies on a P300 neurophysiological protocol and automated navigation. In operation, the subject f...
Iñaki Iturrate, Javier M. Antelis, Javier M...
SAC
2006
ACM
14 years 4 months ago
Revisiting 1-copy equivalence in clustered databases
Recently renewed interest in scalable database systems for shared nothing clusters has been supported by replication protocols based on group communication that are aimed at seaml...
Rui Carlos Oliveira, José Pereira, Alfr&aci...