Sciweavers

2699 search results - page 73 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
OTM
2009
Springer
14 years 3 months ago
Evaluating Transport Protocols for Real-Time Event Stream Processing Middleware and Applications
Real-time event stream processing (RT-ESP) applications must synchronize continuous data streams despite fluctuations in resource availability. Satisfying these needs of RT-ESP ap...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 3 months ago
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks
—In this paper the performance of unslotted ALOHA and CSMA are analyzed in spatially distributed wireless networks. Users/packets arrive randomly in space and time according to a...
Mariam Kaynia, Nihar Jindal
MSWIM
2005
ACM
14 years 2 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
INFOCOM
2012
IEEE
11 years 11 months ago
ICP: Design and evaluation of an Interest control protocol for content-centric networking
—Content-centric networking (CCN) brings a paradigm shift in the present Internet communication model by addressing named-data instead of host locations. With respect to TCP/IP, ...
Giovanna Carofiglio, Massimo Gallo, Luca Muscariel...
VTC
2007
IEEE
138views Communications» more  VTC 2007»
14 years 3 months ago
Performance Evaluation of IEEE 802.11-based WLANs in Vehicular Scenarios
—Communication between cars can be exploited for various applications. Security enhancements as well as interactive games played by occupants of different cars are only two examp...
Matthias Wellens, Burkhard Westphal, Petri Mä...