Sciweavers

1342 search results - page 222 / 269
» Attacks are Protocols Too
Sort
View
VRML
1999
ACM
15 years 6 months ago
An Open Virtual Environment for Autonomous Agents Using VRML and Java
We describe a VRML/Java-based virtual environment that is populated with heterogeneous articulated agents. In this simulated environment, agents compete for collecting certain obj...
Bernhard Jung, Jan-Torsten Milde
ICCCN
1998
IEEE
15 years 6 months ago
Distinguishing Congestion Losses from Wireless Transmission Losses : A Negative Result
TCP is a popular transport protocol used in present-day internet. When packet losses occur, TCP assumes that the packet losses are due to congestion, and responds by reducing its ...
Saad Biaz, Nitin H. Vaidya
120
Voted
ADC
2009
Springer
151views Database» more  ADC 2009»
15 years 6 months ago
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution
Radio Frequency Identification (RFID) technology uses radio-frequency waves to automatically identify people or objects. A large volume of data, resulting from the fast capturing ...
Prapassara Pupunwiwat, Bela Stantic
ICCCN
2007
IEEE
15 years 5 months ago
Principles of IEEE 802.11s
In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) "s". 802.11s develo...
Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Dent...
155
Voted
ATVA
2006
Springer
114views Hardware» more  ATVA 2006»
15 years 5 months ago
Selective Approaches for Solving Weak Games
Abstract. Model-checking alternating-time properties has recently attracted much interest in the verification of distributed protocols. While checking the validity of a specificati...
Malte Helmert, Robert Mattmüller, Sven Schewe