Sciweavers

4305 search results - page 718 / 861
» Analysing Protocol Implementations
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks
Abstract— Although direct reciprocity (Tit-for-Tat) contribution systems have been successful in reducing freeloading in peerto-peer overlays, it has been shown that, unless the ...
Raul Landa, David Griffin, Richard G. Clegg, Eleni...
INFOCOM
2009
IEEE
15 years 10 months ago
Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware
—We design and implement Soft-TDMAC, a software Time Division Multiple Access (TDMA) based MAC protocol, running over commodity 802.11 hardware. Soft-TDMAC has a synchronization ...
Petar Djukic, Prasant Mohapatra
WWIC
2009
Springer
157views Communications» more  WWIC 2009»
15 years 10 months ago
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments
As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLA...
Sheila Fallon, Paul Jacob, Yuansong Qiao, Liam Mur...
ARGMAS
2009
Springer
15 years 10 months ago
Multi-Party Argument from Experience
Abstract. A framework, PISA, for conducting dialogues to resolve disputes concerning the correct categorisation of particular cases, is described. Unlike previous systems to conduc...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...
PAIRING
2009
Springer
124views Cryptology» more  PAIRING 2009»
15 years 10 months ago
Fast Hashing to G2 on Pairing-Friendly Curves
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of ...
Michael Scott, Naomi Benger, Manuel Charlemagne, L...