Sciweavers

7300 search results - page 239 / 1460
» Multi-modal network protocols
Sort
View
NSDI
2008
15 years 7 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
INFORMATICALT
2006
100views more  INFORMATICALT 2006»
15 years 5 months ago
Optimal Agreement in a Scale-Free Network Environment
Generally, the task in a distributed system must achieve an agreement. It requires a set of processors to agree on a common value even if some components are corrupted. There are s...
Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang
COMSUR
2011
196views Hardware» more  COMSUR 2011»
14 years 5 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
KIVS
2009
Springer
16 years 8 hour ago
Enhancing Application Layer Multicast Solutions by Wireless Underlay Support
Abstract. Application Layer Multicast (ALM) is an attractive solution to overcome the deployment problems of IP-Multicast. We show how to cope with the challenges of incorporating ...
Christian Hübsch, Oliver P. Waldhorst
INFOCOM
2006
IEEE
15 years 11 months ago
A Brownian Motion Model for Last Encounter Routing
— We use a mathematical model based on Brownian motion to analyze the performance of Last Encounter Routing (LER), a routing protocol for ad hoc networks. Our results show that, ...
Stratis Ioannidis, Peter Marbach