Sciweavers

1080 search results - page 118 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
TMC
2010
137views more  TMC 2010»
14 years 8 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
15 years 3 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques
ADHOC
2010
97views more  ADHOC 2010»
14 years 10 months ago
Modeling and analysis of two-flow interactions in wireless networks
Abstract--Interference plays a complex and often defining role in the performance of wireless networks, especially in multi-hop scenarios. In the presence of interference, Carrier ...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh
ICC
2007
IEEE
112views Communications» more  ICC 2007»
15 years 4 months ago
Cross-layer Design and Analysis of Wireless Profiled TCP for Vertical Handover
Abstract - In this paper, we consider downward and upward vertical handovers in integrated wireless LAN and cellular networks, and address Wireless Profiled TCP premature timeouts ...
Humphrey Rutagemwa, Sangheon Pack, Xuemin Shen, Jo...
TWC
2008
104views more  TWC 2008»
14 years 9 months ago
Adaptive ARQ with energy efficient backoff on Markov fading links
In this letter, we are concerned with adaptive ARQ techniques combined with backoff strategies that exploit the bursty nature of wireless links for improved energy savings. Specifi...
Ananthanarayanan Chockalingam, Michele Zorzi