Sciweavers

981 search results - page 90 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
TC
2008
14 years 11 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
CORR
2008
Springer
126views Education» more  CORR 2008»
14 years 11 months ago
MIMO Two-way Relay Channel: Diversity-Multiplexing Tradeoff Analysis
A multi-hop two-way relay channel is considered in which all the terminals are equipped with multiple antennas. Assuming independent quasi-static Rayleigh fading channels and chann...
Deniz Gündüz, Andrea J. Goldsmith, H. Vi...
COMSWARE
2006
IEEE
15 years 3 months ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
INFOCOM
2010
IEEE
14 years 9 months ago
Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh Networks
Multi-gigabit outdoor mesh networks operating in the unlicensed 60 GHz "millimeter (mm) wave" band, offer the possibility of a quickly deployable broadband extension of t...
Sumit Singh, Raghuraman Mudumbai, Upamanyu Madhow
SRDS
2000
IEEE
15 years 3 months ago
Using Multicast Communication to Reduce Deadlock in Replicated Databases
Obtaining good performance from a distributed replicated database that allows update transactions to originate at any site while ensuring one-copy serializability is a challenge. ...
JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi