Sciweavers

2947 search results - page 154 / 590
» The timely token protocol
Sort
View
JTRES
2009
ACM
15 years 11 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
173
Voted
VTC
2008
IEEE
135views Communications» more  VTC 2008»
15 years 11 months ago
MACA-MN: A MACA-Based MAC Protocol for Underwater Acoustic Networks with Packet Train for Multiple Neighbors
Abstract— Unlike the terrestrial wireless networks that utilize the radio channel, underwater networks use the acoustic channel, which poses research challenges in the medium acc...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
137
Voted
IPPS
2007
IEEE
15 years 11 months ago
Novel Broadcast/Multicast Protocols for Dynamic Sensor Networks
: In this paper, we have proposed a time efficient, energy saving and robust broadcast/multicast protocol for reconfigurable cluster-based sensor network. In our broadcast protocol...
Wei Chen, Islam A. K. M. Muzahidul, Mohan Malkani,...
DSN
2006
IEEE
15 years 11 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
134
Voted
MDAI
2005
Springer
15 years 10 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto