Sciweavers

1785 search results - page 217 / 357
» Modeling Communication with Synchronized Environments
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 1 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
NETGAMES
2005
ACM
15 years 9 months ago
Framework for evaluation of networked mobile games
In this position paper we propose an evaluation framework for networked mobile gaming, consisting of user, group, communication, and environment models. Each of these components a...
Leo Petrak, Olaf Landsiedel, Klaus Wehrle
IWQOS
2005
Springer
15 years 9 months ago
Performance Analysis of Wireless Scheduling with ARQ in Fast Fading Channels
In this paper, we study the performance of opportunistic scheduling for downlink data transmissions with type-II packet-combining hybrid ARQ in a multirate cellular network for a f...
Hwee Pink Tan
IRI
2005
IEEE
15 years 9 months ago
Data-knowledge-context: an application model for collaborative work
For many years, researchers and software developers have been seeking to develop systems and applications to enable efficient and effective group work and organizational memory. ...
Lee A. Iverson
P2P
2007
IEEE
15 years 10 months ago
A Data Placement Scheme with Time-Related Model for P2P Storages
Maintaining desired data availability while minimizing costs is the primary challenge in designing P2P storages. Data placement schemes and data availability calculation methods a...
Jing Tian, Zhi Yang, Yafei Dai