Sciweavers

1080 search results - page 97 / 216
» Protocol Based Communication for Situated Multi-Agent System...
Sort
View
IWCMC
2009
ACM
15 years 4 months ago
On fault tolerant ad hoc network design
Minimal configuration and quick deployment of ad hoc networks make it suitable for numerous applications such as emergency situations, border monitoring, and military missions, e...
Wasim El-Hajj, Hazem Hajj, Zouheir Trabelsi
ICNP
2005
IEEE
15 years 3 months ago
MuON: Epidemic Based Mutual Anonymity
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean...
ICC
2007
IEEE
15 years 4 months ago
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska
TOCS
1998
114views more  TOCS 1998»
14 years 9 months ago
Performance Evaluation of the Orca Shared-Object System
Orca is a portable, object-based distributed shared memory system. This paper studies and evaluates the design choices made in the Orca system and compares Orca with other DSMs. T...
Henri E. Bal, Raoul Bhoedjang, Rutger F. H. Hofman...
AINA
2004
IEEE
15 years 1 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang