Sciweavers

1080 search results - page 78 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
VTC
2007
IEEE
150views Communications» more  VTC 2007»
15 years 10 months ago
Analysis of Resource Reservation Aggregation in On-Board Networks
Abstract— The concept of providing mobile Internet connectivity for passengers in public transport vehicles, where users connect to a local network that attaches to the Internet v...
Muhammad Ali Malik, Lavy Libman, Salil S. Kanhere,...
HPCA
2003
IEEE
16 years 4 months ago
A Statistically Rigorous Approach for Improving Simulation Methodology
Due to cost, time, and flexibility constraints, simulators are often used to explore the design space when developing a new processor architecture, as well as when evaluating the ...
Joshua J. Yi, David J. Lilja, Douglas M. Hawkins
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
15 years 7 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
SAC
2010
ACM
15 years 11 months ago
Analysis of collision probability in unsaturated situation
A large number of the MAC protocols proposed for establishing wireless sensor networks are based on the 802.11 standard. The trade-off in these protocols is the control packet ov...
Qian Dong, Waltenegus Dargie
EUROPAR
2008
Springer
15 years 5 months ago
Auction Protocols for Resource Allocations in Ad-Hoc Grids
Abstract. Different auction-based approaches have been used to allocate resources in Grids, but none of them provide the design choice for a specific economic model while consideri...
Behnaz Pourebrahimi, Koen Bertels