Sciweavers

1674 search results - page 69 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 3 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
WCNC
2008
IEEE
14 years 3 months ago
A Density Adaptive Routing Protocol for Large-Scale Ad Hoc Networks
Abstract—Position-based routing protocols use location information to refine the traditional packet flooding method in mobile ad hoc networks. They mainly focus on densely and ...
Zhizhou Li, Yaxiong Zhao, Yong Cui, Dong Xiang
DATE
2006
IEEE
151views Hardware» more  DATE 2006»
14 years 2 months ago
40Gbps de-layered silicon protocol engine for TCP record
We present a de-layered protocol engine for termination of 40Gbps TCP connections using a reconfigurable FPGA silicon platform. This protocol engine is designed for a planned att...
H. Shrikumar
WAC
2005
Springer
137views Communications» more  WAC 2005»
14 years 2 months ago
Towards Self-optimizing Protocol Stack for Autonomic Communication: Initial Experience
Abstract. The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are underminin...
Xiaoyuan Gu, Xiaoming Fu, Hannes Tschofenig, Lars ...
FSTTCS
2004
Springer
14 years 2 months ago
Adaptive Stabilization of Reactive Protocols
A self-stabilizing distributed protocol can recover from any state-corrupting fault. A self-stabilizing protocol is called adaptive if its recovery time is proportional to the numb...
Shay Kutten, Boaz Patt-Shamir