Sciweavers

1462 search results - page 186 / 293
» The Abstract MAC Layer
Sort
View
104
Voted
ICC
2000
IEEE
153views Communications» more  ICC 2000»
15 years 5 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
ELPUB
2000
ACM
15 years 5 months ago
XML: Using an Evolving Standard in Electronic Publishing
XML is the proposed electronic publishing and data interchange format of the future. Currently XML is immature with little tool support, particularly for end-user World Wide Web br...
Ann Apps, Ross MacIntyre
ASIACRYPT
2000
Springer
15 years 5 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
CP
2000
Springer
15 years 5 months ago
Extending Forward Checking
Abstract. Among backtracking based algorithms for constraint satisfaction problems (CSPs), algorithms employing constraint propagation, like forward checking (FC) and MAC, have had...
Fahiem Bacchus
GROUP
1999
ACM
15 years 5 months ago
Getting some perspective: using process descriptions to index document history
Process descriptions are used in workflow and related systems to describe the flow of work and organisational responsibility in business processes, and to aid in coordination. How...
Paul Dourish, Richard Bentley, Rachel Jones, Allan...