Sciweavers

648 search results - page 3 / 130
» The GCHQ Protocol and Its Problems
Sort
View
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
ANSS
2000
IEEE
13 years 12 months ago
IRLSim: A General Purpose Packet Level Network Simulator
Simulation is the main tool for studying networking protocols before deploying them in a wide scale, or for understanding how they are expected to behave under various conditions....
Andreas Terzis, Konstantinos Nikoloudakis, Lan Wan...
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
14 years 2 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
WAOA
2005
Springer
92views Algorithms» more  WAOA 2005»
14 years 28 days ago
The Conference Call Search Problem in Wireless Networks
Cellular telephony systems, where locations of mobile users are unknown at some times, are becoming more common. In such systems, mobile users are roaming in a zone and a user repo...
Leah Epstein, Asaf Levin
IPPS
2005
IEEE
14 years 1 months ago
Combinatorial Auction-Based Protocols for Resource Allocation in Grids
In this paper, we introduce the combinatorial auction model for resource management in grids. We propose a combinatorial auction-based resource allocation protocol in which a user...
Anubhav Das, Daniel Grosu