Sciweavers

3938 search results - page 143 / 788
» Interactive Protocols on the Reals
Sort
View
116
Voted
MSWIM
2005
ACM
15 years 6 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
90
Voted
DALT
2006
Springer
15 years 4 months ago
Dynamic Model Checking for Multi-agent Systems
Abstract. This paper is concerned with the problem of obtaining predictable interactions between groups of agents in open environments when individual agents do not expose their bd...
Nardine Osman, David Robertson, Christopher Walton
105
Voted
PERCOM
2006
ACM
16 years 13 days ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
93
Voted
HCI
2001
15 years 2 months ago
Human-computer protocols
s, covering different levels of abstraction over the information exchanged. As the protocol is layered, we can discuss interaction in terms of different levels of granularity, bett...
David J. Duke, David A. Duce, Philip J. Barnard, J...
123
Voted
ICECCS
2009
IEEE
156views Hardware» more  ICECCS 2009»
14 years 10 months ago
Energy Efficient Duty Allocation Protocols for Wireless Sensor Networks
Wireless sensor networks require shared medium access management to prevent collisions, message corruption and other unhelpful effects. Cellular sensornets require minimal energy ...
Jonathan Tate, Iain Bate