Sciweavers

7329 search results - page 376 / 1466
» Network Extractor Protocols
Sort
View
EUROCRYPT
2007
Springer
15 years 8 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo
ICC
2000
IEEE
233views Communications» more  ICC 2000»
15 years 8 months ago
Multicasting Sustained CBR and VBR Traffic in Wireless Ad-Hoc Networks
Wireless ad-hoc networks consist of mobile nodes forming a dynamically changing topology without any infrastructure. Multicasting in a wireless ad-hoc network is difficult and chal...
George D. Kondylis, Srikanth V. Krishnamurthy, Son...
129
Voted
ISCAPDCS
2001
15 years 6 months ago
Comparison of Various TCP Implementations in a Congested Network
Transmission Control Protocol (TCP) in the Internet Protocol suite has become over the years the most widely used protocol for data communications. Recent developments in high-spe...
Mansoor Alam, Shravan K. Vallala, Min Song
JPDC
2006
187views more  JPDC 2006»
15 years 4 months ago
On constructing k-connected k-dominating set in wireless ad hoc and sensor networks
An important problem in wireless ad hoc and sensor networks is to select a few nodes to form a virtual backbone that supports routing and other tasks such as area monitoring. Prev...
Fei Dai, Jie Wu
INFOCOM
2011
IEEE
14 years 8 months ago
Throughput and delay scaling of general cognitive networks
—There has been recent interest within the networking research community to understand how performance scales in cognitive networks with overlapping n primary nodes and m seconda...
Wentao Huang, Xinbing Wang