Sciweavers

1565 search results - page 266 / 313
» Optimizing Layered Communication Protocols
Sort
View
144
Voted
ICICS
2007
Springer
15 years 6 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
134
Voted
CCS
2008
ACM
15 years 4 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
114
Voted
SAC
2008
ACM
15 years 2 months ago
Large-scale simulation of V2V environments
Providing vehicles with enhanced ability to communicate and exchange real-time data with neighboring vehicles opens up a variety of complex challenges that can only be met by comb...
Hugo Conceição, Luís Damas, M...
215
Voted
GLOBECOM
2010
IEEE
15 years 17 days ago
Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Exist...
Piergiuseppe Di Marco, Pan Gun Park, Carlo Fischio...
123
Voted
SECON
2010
IEEE
15 years 13 days ago
Disruption-Tolerant Spatial Dissemination
Abstract-- Spatial dissemination is a specific form of information dissemination that enables mobile users to send information to other mobile users who are or will appear at a spe...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...