Sciweavers

7300 search results - page 44 / 1460
» Multi-modal network protocols
Sort
View
SIAMCOMP
2010
97views more  SIAMCOMP 2010»
15 years 10 days ago
Designing Network Protocols for Good Equilibria
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol t...
Ho-Lin Chen, Tim Roughgarden, Gregory Valiant
ISCA
1993
IEEE
153views Hardware» more  ISCA 1993»
15 years 6 months ago
An Adaptive Cache Coherence Protocol Optimized for Migratory Sharing
Parallel programs that use critical sections and are executed on a shared-memory multiprocessor with a writeinvalidate protocol result in invalidation actions that could be elimin...
Per Stenström, Mats Brorsson, Lars Sandberg
CONEXT
2006
ACM
15 years 8 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
135
Voted
AINA
2006
IEEE
15 years 5 months ago
Constrained Flooding: A Robust and Efficient Routing Framework for Wireless Sensor Networks
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenan...
Ying Zhang, Markus P. J. Fromherz
AINA
2006
IEEE
15 years 8 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi