Sciweavers

2947 search results - page 158 / 590
» The timely token protocol
Sort
View
163
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks
This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for UWSN fac...
Affan A. Syed, Wei Ye, John S. Heidemann
PIMRC
2008
IEEE
15 years 11 months ago
Comparative performance evaluation of MAC protocols in ad hoc networks with bandwidth partitioning
—This paper considers the performance of the MAC protocols ALOHA and CSMA in wireless ad hoc networks, where the total system bandwidth may be divided into smaller subbands. In t...
Mariam Kaynia, Geir E. Øien, Nihar Jindal, ...
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 11 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
159
Voted
MOBICOM
2006
ACM
15 years 11 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
BROADNETS
2005
IEEE
15 years 10 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang