Sciweavers

2947 search results - page 147 / 590
» The timely token protocol
Sort
View
127
Voted
JHSN
1998
66views more  JHSN 1998»
15 years 4 months ago
A case for dynamic sender-based reservations in the Internet
In this paper we discuss the need for resource reservation in the Internet and examine some of the strengths and weaknesses of RSVP, which is currently the most popular of Interne...
Paul Patrick White, Jon Crowcroft
CDC
2010
IEEE
294views Control Systems» more  CDC 2010»
15 years 1 days ago
Adaptive self-triggered control over IEEE 802.15.4 networks
The communication protocol IEEE 802.15.4 is becoming pervasive for low power and low data rate wireless sensor networks (WSNs) applications, including control and automation. Never...
Ubaldo Tiberi, Carlo Fischione, Karl Henrik Johans...
ASIACRYPT
2001
Springer
15 years 9 months ago
Responsive Round Complexity and Concurrent Zero-Knowledge
The number of communication rounds is a classic complexity measure for protocols; reducing round complexity is a major goal in protocol design. However, when the communication time...
Tzafrir Cohen, Joe Kilian, Erez Petrank
159
Voted
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
15 years 10 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
ICNP
1996
IEEE
15 years 9 months ago
On the relationship between file sizes, transport protocols, and self-similar network traffic
Recent measurements of local-area and wide-area traffic have shown that network traffic exhibits variability at a wide range of scales. In this paper, we examine a mechanism that ...
Kihong Park, Gitae Kim, Mark Crovella