Sciweavers

1080 search results - page 39 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
114
Voted
DCOSS
2005
Springer
15 years 9 months ago
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications
Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to gu...
Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
113
Voted
ICCSA
2005
Springer
15 years 9 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
119
Voted
CIIT
2004
15 years 5 months ago
Analysis and improvements of the eventing protocol for universal plug and play
UPnP is a widely-spread connectivity standard, which allows networked devices to cooperate in an autonomous fashion by using functionality found on the network. In this article we...
Y. Mazuryk, Johan J. Lukkien
159
Voted
COMCOM
2008
244views more  COMCOM 2008»
15 years 3 months ago
Energy analysis of routing protocols for underwater wireless sensor networks
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
Mari Carmen Domingo, Rui Prior
141
Voted
IPPS
2007
IEEE
15 years 10 months ago
A Design and Analysis of a Hybrid Multicast Transport Protocol for the Haptic Virtual Reality Tracheotomy Tele-Surgery Applicati
Nowadays, distributed collaborative virtual environments are used in many scenarios such as tele-surgery, gaming, and industrial training, However several challenging issues remai...
Azzedine Boukerche, Haifa Maamar, Abuhoss Hossain