Sciweavers

21 search results - page 3 / 5
» Risk Balance in Exchange Protocols
Sort
View
PIMRC
2010
IEEE
13 years 5 months ago
A fair and Adaptive Contention Resolution Algorithm for time-slotted MAC protocol designs
Abstract--This paper addresses the fairness of Medium Access Control (MAC) protocols that are capable of handling interference on the physical layer to a varying extent. The variat...
Ulrike Korger, Yingrui Chen, Christian Hartmann, K...
CCGRID
2007
IEEE
14 years 1 months ago
DICHOTOMY: A Resource Discovery and Scheduling Protocol for Multihop Ad hoc Mobile Grids
There has been a good amount of research over the past few years on the integration of mobile devices into computational grids. Little of it, however, has addressed the more chall...
Antônio Tadeu A. Gomes, Artur Ziviani, Lucia...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
ENTCS
2007
145views more  ENTCS 2007»
13 years 7 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...
ICON
2007
IEEE
14 years 1 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen