Sciweavers

3680 search results - page 610 / 736
» cases 2010
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 2 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
TMA
2010
Springer
120views Management» more  TMA 2010»
15 years 2 months ago
DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections
Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the...
Antonio Barbuzzi, Gennaro Boggia, Luigi Alfredo Gr...
VTC
2010
IEEE
167views Communications» more  VTC 2010»
15 years 2 months ago
The Impact of Fading on the Outage Probability in Cognitive Radio Networks
Abstract--This paper analyzes the outage probability in cognitive radio networks, based on the Poisson point process model of node spatial distribution and the standard propagation...
Yaobin Wen, Sergey Loyka, Abbas Yongaçoglu
WIOPT
2010
IEEE
15 years 2 months ago
Routing games : From egoism to altruism
The paper studies the routing in the network shared by several users. Each user seeks to optimize either its own performance or some combination between its own performance and tha...
Amar Prakash Azad, Eitan Altman, Rachid El Azouzi
EJC
2010
14 years 11 months ago
Modelling a Query Space Using Associations
We all use our associative memory constantly. Words and concepts form paths that we can follow to find new related concepts; for example, when we think about a car we may associate...
Mika Timonen, Paula Silvonen, Melissa Kasari