Sciweavers

1505 search results - page 207 / 301
» On wireless network scheduling with intersession network cod...
Sort
View
CCS
2009
ACM
15 years 8 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
TON
2010
136views more  TON 2010»
14 years 11 months ago
Distributed Opportunistic Scheduling With Two-Level Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
INFOCOM
2007
IEEE
15 years 10 months ago
G-3: An O(1) Time Complexity Packet Scheduler That Provides Bounded End-to-End Delay
— In this paper, we present an O(1) time-complexity packet scheduling algorithm which we call G-3 that provides bounded end-to-end delay for fixed size packet networks. G-3 is b...
Chuanxiong Guo
AICT
2005
IEEE
157views Communications» more  AICT 2005»
15 years 6 months ago
Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Automatic repeat request (ARQ) schemes are effective to recover non-real-time data corrupted by channel errors, but their use with real-time traffic is seldom considered because p...
Jose A. Afonso, Joaquim E. Neves
AINA
2005
IEEE
15 years 6 months ago
Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet
— Bluetooth is a short-range TDD (Time Division Duplex) wireless network that supports both circuit- and packetoriented applications. A piconet is composed of a device configure...
Li-Hsing Yen, Chi-Hung Liao