Sciweavers

2947 search results - page 56 / 590
» The timely token protocol
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang
BROADNETS
2007
IEEE
15 years 6 months ago
Practical time synchronization for Bluetooth Scatternets
Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
Matthias Ringwald, Kay Römer
FC
2009
Springer
109views Cryptology» more  FC 2009»
15 years 6 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
67
Voted
ICDCS
2008
IEEE
15 years 6 months ago
A Nonblocking Approach for Reaching an Agreement on Request Total Orders
In distributed systems that use active replication to achieve robustness, it is important to efficiently enforce consistency among replicas. The nonblocking mode helps to speed u...
Yun Wang, Jie Wu
JDM
1998
101views more  JDM 1998»
14 years 11 months ago
Fault-Tolerant Quorum Consensus Scheme for Replication Control in Mobile Distributed Database Systems
We propose a new replication control scheme for multiple-copy consistency in mobile distributed database systems. Replicating data at multiple sites could contribute to enhance th...
Siwoo Byun, Songchun Moon