Sciweavers

620 search results - page 44 / 124
» The computational power of population protocols
Sort
View
IADIS
2004
14 years 11 months ago
Physiology of mobile database: an unconventional database
As the mobility of people increases, anytime, anywhere computing has become a must. The appearance of powerful portable computers, along with advancement in wireless communication...
Imran Khan, Nasir Touheed
EWSN
2010
Springer
15 years 4 months ago
Making Sensornet MAC Protocols Robust against Interference
Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external i...
Carlo Alberto Boano, Thiemo Voigt, Nicolas Tsiftes...
PERCOM
2006
ACM
15 years 3 months ago
A High-throughput MAC Protocol for Wireless Ad Hoc Networks
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow concurrent transmission among neighboring nodes as much as possible. In ...
Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong ...
NDSS
2000
IEEE
15 years 2 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
ASIACRYPT
2007
Springer
15 years 4 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...