Sciweavers

2947 search results - page 2 / 590
» The timely token protocol
Sort
View
ISCC
2003
IEEE
13 years 10 months ago
Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...
TPDS
2008
134views more  TPDS 2008»
13 years 4 months ago
Extending the TokenCMP Cache Coherence Protocol for Low Overhead Fault Tolerance in CMP Architectures
It is widely accepted that transient failures will appear more frequently in chips designed in the near future due to several factors such as the increased integration scale. On th...
Ricardo Fernández Pascual, José M. G...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 14 days ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
CIT
2006
Springer
13 years 9 months ago
Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs
In this paper, we propose Sniff and Embark (SN E) protocol, a novel frame sniffing and token passing based approach to provide QoS in WLANs. Our simulations show that SN E perform...
Aditya Dhananjay, Debabrata Das
OPODIS
2008
13 years 7 months ago
Rendezvous of Mobile Agents When Tokens Fail Anytime
Abstract. We consider the problem of Rendezvous or gathering of multiple autonomous entities (called mobile agents) moving in an unlabelled environment (modelled as a graph). The p...
Shantanu Das, Matús Mihalák, Rastisl...