Sciweavers

294 search results - page 28 / 59
» The flooding time synchronization protocol
Sort
View
IPPS
2000
IEEE
14 years 2 months ago
Real-Time Transaction Processing Using Two-Stage Validation in Broadcast Disks
Conventional concurrency control protocols are inapplicable in mobile computing environments due to a number of constraints of wireless communications. In this paper, we design a p...
Kwok-Wa Lam, Victor C. S. Lee, Sang Hyuk Son
KIVS
2005
Springer
14 years 3 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
SEC
2007
13 years 11 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
COMCOM
2006
96views more  COMCOM 2006»
13 years 10 months ago
Design and implementation of a dynamic protocol framework
-- Future distributed applications are expected to be deployed in an environment that is more dynamic and heterogeneous than ever before. The environment features are difficult to ...
Liming An, Hung Keng Pung, Lifeng Zhou
TPDS
2010
176views more  TPDS 2010»
13 years 8 months ago
Coupling-Based Internal Clock Synchronization for Large-Scale Dynamic Distributed Systems
This paper studies the problem of realizing a common software clock among a large set of nodes without an external time reference (i.e., internal clock synchronization), any centr...
Roberto Baldoni, Angelo Corsaro, Leonardo Querzoni...