Sciweavers

1080 search results - page 145 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
SASN
2006
ACM
15 years 3 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 3 months ago
Quality-of-Service-Oriented Media Access Control for Advanced Mobile Multimedia Satellite Systems
Satellite networks offer a number of desirable characteristics including wide area coverage, unique broadcast capabilities, the ability to communicate with hand-held devices, and ...
Petia Todorova, Alexander Markhasin
SPAA
2010
ACM
15 years 2 months ago
Collaborative scoring with dishonest participants
Consider a set of players that are interested in collectively evaluating a set of objects. We develop a collaborative scoring protocol in which each player evaluates a subset of t...
Seth Gilbert, Rachid Guerraoui, Faezeh Malakouti R...
ICDCS
2010
IEEE
14 years 11 months ago
ASAP: Scalable Identification and Counting for Contactless RFID Systems
The growing importance of operations such as identification, location sensing and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFI...
Chen Qian, Yunhuai Liu, Hoilun Ngan, Lionel M. Ni
USENIX
2004
14 years 11 months ago
Early Experience with an Internet Broadcast System Based on Overlay Multicast
In this paper, we report on experience in building and deploying an operational Internet broadcast system based on Overlay Multicast. In over a year, the system has been providing...
Yang-Hua Chu, Aditya Ganjam, T. S. Eugene Ng, Sanj...