Sciweavers

1080 search results - page 39 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
DCOSS
2005
Springer
15 years 5 months ago
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications
Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to gu...
Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
78
Voted
ICCSA
2005
Springer
15 years 5 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
CIIT
2004
15 years 1 months ago
Analysis and improvements of the eventing protocol for universal plug and play
UPnP is a widely-spread connectivity standard, which allows networked devices to cooperate in an autonomous fashion by using functionality found on the network. In this article we...
Y. Mazuryk, Johan J. Lukkien
COMCOM
2008
244views more  COMCOM 2008»
14 years 12 months ago
Energy analysis of routing protocols for underwater wireless sensor networks
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
Mari Carmen Domingo, Rui Prior
IPPS
2007
IEEE
15 years 6 months ago
A Design and Analysis of a Hybrid Multicast Transport Protocol for the Haptic Virtual Reality Tracheotomy Tele-Surgery Applicati
Nowadays, distributed collaborative virtual environments are used in many scenarios such as tele-surgery, gaming, and industrial training, However several challenging issues remai...
Azzedine Boukerche, Haifa Maamar, Abuhoss Hossain