Sciweavers

404 search results - page 30 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
157
Voted
COMCOM
2008
244views more  COMCOM 2008»
15 years 3 months ago
Energy analysis of routing protocols for underwater wireless sensor networks
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
Mari Carmen Domingo, Rui Prior
159
Voted
ICWN
2003
15 years 5 months ago
The Effect of Disengaging RTS/CTS Dialogue in IEEE 802.11 MAC Protocol
In this paper, we study the effect of using or disengaging the RTS/CTS dialogue in IEEE 802.11 DCF MAC protocol incorporating the realistic condition under which carrier sensing, ...
Laura Huei-jiun Ju, Izhak Rubin
IPPS
1998
IEEE
15 years 8 months ago
Eliminating the Protocol Stack for Socket Based Communication in Shared Memory Interconnects
We show how the traditional protocol stack, such as TCP/IP, can be eliminated for socket based high speed communication within a cluster. The SCI shared memory interconnect is used...
Stein Jørgen Ryan, Haakon Bryhni
140
Voted
ETRA
2000
ACM
199views Biometrics» more  ETRA 2000»
15 years 7 months ago
Identifying fixations and saccades in eye-tracking protocols
The process of fixation identification--separating and labeling fixations and saccades in eye-tracking protocols--is an essential part of eye-movement data analysis and can have a...
Dario D. Salvucci, Joseph H. Goldberg
139
Voted
EUROCRYPT
1999
Springer
15 years 8 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart