Sciweavers

1426 search results - page 82 / 286
» A theory of goal-oriented communication
Sort
View
SIGCOMM
2009
ACM
15 years 8 months ago
Tuning message size in opportunistic mobile networks
We describe a new model for studying intermittently connected mobile networks, based on Markovian random temporal graphs, that captures the influence of message size, maximum tol...
John Whitbeck, Vania Conan, Marcelo Dias de Amorim
INFOCOM
2008
IEEE
15 years 8 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
CSFW
1997
IEEE
15 years 5 months ago
Verifying authentication protocols with CSP
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes (CSP). It is illustrated by ...
Steve Schneider
QCQC
1998
Springer
104views Communications» more  QCQC 1998»
15 years 5 months ago
Trapped Ion Quantum Computer Research at Los Alamos
Abstract. We briefly review the development and theory of an experiment to investigate quantum computation with trapped calcium ions. The ion trap, laser and ion requirements are d...
D. F. V. James, M. S. Gulley, M. H. Holzscheiter, ...
MMB
2010
Springer
153views Communications» more  MMB 2010»
15 years 3 months ago
The Total Overflow during a Busy Cycle in a Markov-Additive Finite Buffer System
We consider a finite buffer system where the buffer content moves in a Markov-additive way while it is strictly between the buffer boundaries. Upon reaching the upper boundary of t...
Lothar Breuer