Sciweavers

1080 search results - page 125 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ESORICS
2002
Springer
15 years 9 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
ICIP
2002
IEEE
15 years 11 months ago
Open-loop rate control for real-time video streaming: analysis of binomial algorithms
Emerging real-time streaming applications often rely on rate-based flow control. However, congestion control for rate-based applications is typically dismissed as being not viable...
Dmitri Loguinov, Hayder Radha
ISCC
2008
IEEE
148views Communications» more  ISCC 2008»
15 years 4 months ago
Data collection in sensor networks with data mules: An integrated simulation analysis
Wireless sensor networks (WSNs) have emerged as the enabling technology for a wide range of applications. In the context of environmental monitoring, especially in urban scenarios...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco
89
Voted
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 4 months ago
Finite Queuing Model Analysis for Energy and QoS Tradeoff in Contention-Based Wireless Sensor Networks
In contention-based sensor networks, nodes compete to access a shared channel for data transmission and collision is a common challenge. For power conservation, periodical active/s...
Jun Luo, Ling-ge Jiang, Chen He
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
15 years 3 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...