Sciweavers

404 search results - page 38 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
148
Voted
WCNC
2010
IEEE
15 years 7 months ago
ROPA: A MAC Protocol for Underwater Acoustic Networks with Reverse Opportunistic Packet Appending
—In most existing sender-initiated handshaking based underwater Media Access Control (MAC) protocols, only the initiating sender is allowed to transmit data packets to its intend...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani
INFOCOM
2008
IEEE
15 years 10 months ago
Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks
—A new and simple MAC protocol is proposed. Each node transmits a burst with length sampled from a geometric distribution with parameter q followed by a carrier sense slot. A nod...
Greger Wikstrand, Thomas Nilsson, Mark S. Doughert...
108
Voted
IAT
2003
IEEE
15 years 9 months ago
A JMS Message Transport Protocol for the JADE Platform
A prerequisite of joining an enterprise system is the ability to cope with the rigorous demands experienced within such systems. One of the most fundamental of these demands is th...
Edward Curry, Desmond Chambers, Gerard Lyons
141
Voted
ICESS
2007
Springer
15 years 9 months ago
Intra Routing Protocol with Hierarchical and Distributed Caching in Nested Mobile Networks
Abstract. We propose a novel route optimization protocol for intraNEMO communication using a hierarchical and distributed caching scheme. The proposed scheme employs the routing ca...
Hyemee Park, Moonseong Kim, Hyunseung Choo
113
Voted
FGCS
2008
140views more  FGCS 2008»
15 years 3 months ago
Blocking vs. non-blocking coordinated checkpointing for large-scale fault tolerant MPI Protocols
A long-term trend in high-performance computing is the increasing number of nodes in parallel computing platforms, which entails a higher failure probability. Fault tolerant progr...
Darius Buntinas, Camille Coti, Thomas Hérau...