Sciweavers

4 search results - page 1 / 1
» Construction of Short Protocol Sequences with Worst-Case Thr...
Sort
View
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 4 months ago
Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee
Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worstcase sys...
Kenneth W. Shum, Wing Shing Wong
MASCOTS
2007
13 years 6 months ago
Performance Analysis of Wireless MAC Protocols Using a Search Based Framework
—Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our ...
Shamim Begum, Sandeep K. S. Gupta, Ahmed Helmy
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
14 years 5 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
SETA
2010
Springer
173views Mathematics» more  SETA 2010»
13 years 3 months ago
User-Irrepressible Sequences
Protocol sequences are binary and periodic sequences used in multiple-access scheme for collision channel without feedback. Each user reads out the bits from the assigned protocol ...
Kenneth W. Shum, Yijin Zhang, Wing Shing Wong