Sciweavers

2699 search results - page 397 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
JDM
1998
101views more  JDM 1998»
13 years 9 months ago
Fault-Tolerant Quorum Consensus Scheme for Replication Control in Mobile Distributed Database Systems
We propose a new replication control scheme for multiple-copy consistency in mobile distributed database systems. Replicating data at multiple sites could contribute to enhance th...
Siwoo Byun, Songchun Moon
IFIPTM
2009
163views Management» more  IFIPTM 2009»
13 years 8 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano
MOBICOM
2012
ACM
12 years 19 days ago
AutoMAC: rateless wireless concurrent medium access
Current wireless network design is built on the ethos of avoiding interference. In this paper we question this long-held design principle. We show that with appropriate design, su...
Aditya Gudipati, Stephanie Pereira, Sachin Katti
MOBISYS
2004
ACM
14 years 9 months ago
Impact of Radio Irregularity on Wireless Sensor Networks
In this paper, we investigate the impact of radio irregularity on the communication performance in wireless sensor networks. Radio irregularity is a common phenomenon which arises...
Gang Zhou, Tian He, Sudha Krishnamurthy, John A. S...
EWSN
2004
Springer
14 years 9 months ago
Structured Communication in Single Hop Sensor Networks
Abstract. We propose a model for communication in single-hop wireless sensor networks and define and evaluate the performance of a robust, energy balanced protocol for a powerful a...
Amol Bakshi, Viktor K. Prasanna