Sciweavers

1674 search results - page 1 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
CCR
2007
85views more  CCR 2007»
13 years 4 months ago
Don't optimize existing protocols, design optimizable protocols
As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of...
Jiayue He, Jennifer Rexford, Mung Chiang
INFOCOM
2009
IEEE
13 years 11 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang
ISCA
1993
IEEE
153views Hardware» more  ISCA 1993»
13 years 9 months ago
An Adaptive Cache Coherence Protocol Optimized for Migratory Sharing
Parallel programs that use critical sections and are executed on a shared-memory multiprocessor with a writeinvalidate protocol result in invalidation actions that could be elimin...
Per Stenström, Mats Brorsson, Lars Sandberg
LATINCRYPT
2010
13 years 3 months ago
Communication Optimal Multi-valued Asynchronous Broadcast Protocol
Abstract. Broadcast (BC) is considered as the most fundamental primitive for fault-tolerant distributed computing and cryptographic protocols. An important and practical variant of...
Arpita Patra, C. Pandu Rangan
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
13 years 8 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay