Sciweavers

4761 search results - page 232 / 953
» Performance of Protocols
Sort
View
133
Voted
MASCOTS
2010
15 years 6 months ago
An Analytical Model with Improved Accuracy of IEEE 802.11 Protocol Under Unsaturated Conditions
In this work the authors present an analytical model that -- compared to previously published work -- more accurately captures the delay of IEEE 802.11 protocol under low, medium,...
Kumaran Vijayasankar, Azar Taufique, Lakshmi Naras...
ISCC
2007
IEEE
15 years 11 months ago
Faithful Distributed Shapley Mechanisms for Sharing the Cost of Multicast Transmissions
Sharing the cost of multicast transmissions was studied in the past and two mechanisms, Marginal Cost and Shapley Value, were proposed. Compared to the Marginal Cost Mechanism the...
Nandan Garg, Daniel Grosu
DSN
2006
IEEE
15 years 11 months ago
One-step Consensus with Zero-Degradation
In the asynchronous distributed system model, consensus is obtained in one communication step if all processes propose the same value. Assuming f < n/3, this is regardless of t...
Dan Dobre, Neeraj Suri
SEC
2003
15 years 6 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
INFOCOM
2005
IEEE
15 years 11 months ago
A comparative study of multicast protocols: top, bottom, or in the middle?
— Multicast solutions have been evolving from “bottom” to “top”, i.e., from IP layer (called IP multicast) to application layer (referred to as application layer multicas...
Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorin...