Sciweavers

972 search results - page 64 / 195
» Design and Protocol for Internet Accessible Mathematical Com...
Sort
View
FOCS
2008
IEEE
15 years 7 months ago
Network Extractor Protocols
We design efficient protocols for processors to extract private randomness over a network with Byzantine faults, when each processor has access to an independent weakly-random n-...
Yael Tauman Kalai, Xin Li, Anup Rao, David Zuckerm...
138
Voted
MOBICOM
2009
ACM
15 years 7 months ago
Frequency-aware rate adaptation and MAC protocols
There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing towar...
Hariharan Rahul, Farinaz Edalat, Dina Katabi, Char...
118
Voted
MOBICOM
2010
ACM
15 years 24 days ago
Pushing the envelope of indoor wireless spatial reuse using directional access points and clients
Recent work demonstrates that directional antennas have significant potential to improve wireless network capacity in indoor environments. This paper provides a broader exploratio...
Xi Liu, Anmol Sheth, Michael Kaminsky, Konstantina...
IEICET
2006
109views more  IEICET 2006»
15 years 18 days ago
Capacity of VoIP over HSDPA with Frame Bundling
In this paper, we evaluate the capacity of voice over internet protocol (VoIP) services over high-speed downlink packet access (HSDPA), in which frame-bundling (FB) is incorporated...
Yong-Seok Kim
CCR
2007
115views more  CCR 2007»
15 years 18 days ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin