Sciweavers

2947 search results - page 55 / 590
» The timely token protocol
Sort
View
ICCCN
1998
IEEE
15 years 4 months ago
A Low Bandwidth Broadcasting Protocol for Video on Demand
Broadcasting protocols can improve the efficiency of video on demand services by reducing the bandwidth required to transmit videos that are simultaneously watched by many viewers...
Jehan-François Pâris, Steven W. Carte...
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 5 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
GLOBECOM
2010
IEEE
14 years 10 months ago
Energy-Aware Real-Time Opportunistic Routing for Wireless Ad Hoc Networks
Existing studies on the design of routing protocols for wireless ad hoc networks mainly focused on energy efficiency. However, in many real-time applications such as target trackin...
Wei Yang, Weifa Liang, Wenhua Dou
ICECCS
2000
IEEE
135views Hardware» more  ICECCS 2000»
15 years 4 months ago
Definitions of Equivalence for Transformational Synthesis of Embedded Systems
Design of embedded systems is a complex task that requires design cycles founded upon formal notation, so that the synthesis from specification to implementation can be carried ou...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
CONCUR
2005
Springer
15 years 5 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey