Sciweavers

834 search results - page 82 / 167
» Quantifying and Measuring Anonymity
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
INFOCOM
2009
IEEE
14 years 4 months ago
Forward Correction and Fountain codes in Delay Tolerant Networks
Abstract—Delay tolerant Ad-hoc Networks leverage the mobility of relay nodes to compensate for lack of permanent connectivity and thus enable communication between nodes that are...
Eitan Altman, Francesco De Pellegrini
DATE
2008
IEEE
107views Hardware» more  DATE 2008»
14 years 4 months ago
Built-in Clock Skew System for On-line Debug and Repair
We present a low-cost on-line system for clock skew management in integrated circuits. Our Built-In Clock Skew System (BICSS) uses a centralized approach to identify, quantify and...
Atanu Chattopadhyay, Zeljko Zilic
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 4 months ago
Achieving Fair TCP Access in the IEEE 802.11 Infrastructure Basic Service Set
—We illustrate the transport layer unfairness problem in the IEEE 802.11 Wireless Local Area Networks (WLANs). We design a link layer access control block for the Access Point (A...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
ISCAS
2008
IEEE
113views Hardware» more  ISCAS 2008»
14 years 4 months ago
Stability study of the TCP-RED system using detrended fluctuation analysis
— It has been observed that the TCP-RED system may exhibit instability and oscillatory behavior. Control methods proposed in the past have been based on the analytical models tha...
Xi Chen, Siu Chung Wong, Chi Kong Tse, Ljiljana Tr...