Sciweavers

7329 search results - page 352 / 1466
» Network Extractor Protocols
Sort
View
ASIACRYPT
2004
Springer
15 years 10 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
15 years 2 months ago
A hybrid FEC-ARQ protocol for low-delay lossless sequential data streaming
Interactive Internet Applications that rely on sequential streams for lossless data exchange often use retransmission protocols (e.g. TCP) for reliability and the guarantee of seq...
Ying-zong Huang, Sanjeev Mehrotra, Jin Li
PERCOM
2007
ACM
16 years 4 months ago
Energy-Aware Tag Anti-Collision Protocols for RFID Systems
Energy consumption of mobile readers is becoming an important issue as applications of RFID systems pervade different aspects of our lives. Surprisingly, however, these systems ar...
Vinod Namboodiri, Lixin Gao
AINA
2009
IEEE
15 years 11 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
LCN
2008
IEEE
15 years 11 months ago
Spatially Disjoint Multipath Routing protocol without location information
—Multipath routing permits the discovery and use of multiple paths between a source and a destination. We develop a distributed on-demand multipath routing protocol for MANETs ca...
Juan Jose Galvez, Pedro M. Ruiz, Antonio F. G&oacu...