Sciweavers

1498 search results - page 79 / 300
» Collection tree protocol
Sort
View
INFOCOM
2000
IEEE
15 years 6 months ago
Medium Access Control Protocols using Directional Antennas in Ad Hoc Networks
—Using directional antennas can be beneficial for wireless ad hoc networks consisting of a collection of wireless hosts. To best utilize directional antennas, a suitable Medium ...
Young-Bae Ko, Vinaychandra Shankarkumar, Nitin H. ...
APN
1999
Springer
15 years 6 months ago
The Incremental Modelling of the Z39.50 Protocol with Object Petri Nets
: This paper examines how object-oriented extensions to the Petri Net formalism provide flexible structuring primitives which can aid the modelling of network protocols. A key bene...
Charles Lakos, John Lamp
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 3 months ago
Playing With Population Protocols
Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous ...
Olivier Bournez, Jérémie Chalopin, J...
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
140
Voted
JCM
2008
138views more  JCM 2008»
15 years 2 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino