Sciweavers

395 search results - page 35 / 79
» Performance Evaluation of the MoM Mobile Multicast Protocol
Sort
View
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 10 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
IWCMC
2006
ACM
14 years 2 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen
QOFIS
2004
Springer
14 years 2 months ago
Cross-Layer Analytical Modeling of Wireless Channels for Accurate Performance Evaluation
Abstract. An intention to adopt IP protocol for future mobile communication and subsequent extension of Internet services to the air interface calls for advanced performance modeli...
Dmitri Moltchanov, Yevgeni Koucheryavy, Jarmo Harj...
EUROPAR
2005
Springer
14 years 2 months ago
Consistent Data Replication: Is It Feasible in WANs?
Abstract. Recent proposals have shown that database replication providing 1copy-serializability can have excellent performance in LAN environments by using powerful multicast primi...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
AHSWN
2010
103views more  AHSWN 2010»
13 years 8 months ago
Efficient Data Retrieving in Distributed Data-streaming Environments
In a potential distributed application, Automobile Tracking System (ATS), automobile location data is continuously generated, kept in a distributed manner. As large amount of traff...
Jinsong Han, Jun Miao, Jizhong Zhao, Jinpeng Huai,...