Sciweavers

404 search results - page 62 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
IOLTS
2002
IEEE
127views Hardware» more  IOLTS 2002»
15 years 8 months ago
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...
154
Voted
CPE
1998
Springer
123views Hardware» more  CPE 1998»
15 years 7 months ago
A Modular and Scalable Simulation Tool for Large Wireless Networks
This paper describes a modular and scalable simulation environment, called GloMoSim, to evaluate end-to-end performance of integrated wired and wireless networks. GloMoSim has been...
Rajive Bagrodia, Mario Gerla
ICDCS
1995
IEEE
15 years 7 months ago
I-TCP: Indirect TCP for Mobile Hosts
— IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols ...
Ajay V. Bakre, B. R. Badrinath
143
Voted
WCE
2007
15 years 4 months ago
QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing
—Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity within the next few years. There are too many applications where one-t...
Vida Lashkari B. O., Mehdi Dehghan
JCO
2006
234views more  JCO 2006»
15 years 3 months ago
Coverage by directional sensors in randomly deployed wireless sensor networks
We study a novel "coverage by directional sensors" problem with tunable orientations on a set of discrete targets. We propose a Maximum Coverage with Minimum Sensors (MCM...
Jing Ai, Alhussein A. Abouzeid