Sciweavers

981 search results - page 64 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
MSWIM
2005
ACM
15 years 4 months ago
Comparison of multi-channel MAC protocols
This paper compares, through analysis and simulation, a number of multichannel MAC protocols for wireless networks. We first classify these protocols into 4 categories based on t...
Jeonghoon Mo, Hoi-sheung Wilson So, Jean C. Walran...
GLOBECOM
2009
IEEE
15 years 6 months ago
Medium Access Control Signaling for Reliable Spectrum Agile Radios
—We address the problem of collaborative sensing in cognitive radios. In a cognitive radio network, all the nodes may sense the spectrum simultaneously. They should then exchange...
Ehsan Azarnasab, Rong-Rong Chen, Koon Hoo Teo, Zhi...
ACISP
2008
Springer
15 years 29 days ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
IJIPT
2006
58views more  IJIPT 2006»
14 years 11 months ago
On protocol engineering: detect, confirm and adjust
: In this paper, we depart from TCP-Probing (Tsaoussidis and Badr, 2000) and propose an experimental transport protocol that achieves energy and throughput performance gains in mix...
Ioannis Psaras, Lefteris Mamatas, Vassilis Tsaouss...
104
Voted
MSWIM
2009
ACM
15 years 6 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...