Sciweavers

1256 search results - page 38 / 252
» A Simple E-Voting Protocol
Sort
View
ICDCS
2011
IEEE
14 years 12 days ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
JSAC
2007
128views more  JSAC 2007»
15 years 20 days ago
Understanding the Power of Pull-Based Streaming Protocol: Can We Do Better?
— Most of the real deployed peer-to-peer streaming systems adopt pull-based streaming protocol. In this paper, we demonstrate that, besides simplicity and robustness, with proper...
Meng Zhang, Qian Zhang, Lifeng Sun, Shiqiang Yang
95
Voted
ICC
2009
IEEE
144views Communications» more  ICC 2009»
15 years 7 months ago
A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels
—Due to the half-duplex property of the underwater acoustic channels, the classic stop-and-wait ARQ (SW-ARQ) and its variants are generally thought to be the only class of ARQ pr...
Mingsheng Gao, Wee-Seng Soh, Meixia Tao
ADHOCNETS
2009
Springer
15 years 7 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte
HASKELL
2009
ACM
15 years 7 months ago
Roll your own test bed for embedded real-time protocols: a haskell experience
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a casestudy, we implement a simple emulator for the Biphase...
Lee Pike, Geoffrey M. Brown, Alwyn Goodloe