Sciweavers

336 search results - page 47 / 68
» Packet level performance analysis in wireless user-relaying ...
Sort
View
ETT
2002
89views Education» more  ETT 2002»
13 years 8 months ago
Delay analysis of a probabilistic priority discipline
In computer networks, the Strict Priority (SP) discipline is perhaps the most common and simplest method to schedule packets from different classes of applications, each with diver...
Yuming Jiang, Chen-Khong Tham, Chi Chung Ko
IEEEARES
2007
IEEE
14 years 3 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
WWIC
2010
Springer
203views Communications» more  WWIC 2010»
14 years 1 months ago
Distributed Cooperation and Diversity for Hybrid Wireless Networks
In this paper, we propose a new Distributed Cooperation and Diversity Combining framework. Our focus is heterogeneous networks with devices equipped with two types of radio frequen...
Hooman Javaheri, Guevara Noubir, Y. Wang