Sciweavers

2947 search results - page 86 / 590
» The timely token protocol
Sort
View
CONCUR
2008
Springer
15 years 6 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
ICUMT
2009
15 years 2 months ago
On the adaptivity of today's Energy-Efficient MAC protocols under varying traffic conditions
Energy efficiency is a major concern in the design of Wireless Sensor Networks (WSNs) and their communication protocols. As the radio transceiver typically accounts for a major por...
Philipp Hurni, Torsten Braun
WSC
1998
15 years 5 months ago
Combining Optimism Limiting Schemes in Time Warp Based Parallel Simulations
The Time Warp protocol is considered to be an effective synchronization mechanism for parallel discrete event simulation (PDES). However, it is widely recognized that it suffers o...
Kevin G. Jones, Samir Ranjan Das
GLOBECOM
2008
IEEE
15 years 11 months ago
Terabit Ethernet: A Time-Space Carrier Sense Multiple Access Method
To achieve Terabit and Petabit switching, both time (high transmission speed) and space (multi-stage interconnection network) technologies are required. We propose an Ethernet for...
Joseph Y. Hui, David A. Daniel
AINA
2004
IEEE
15 years 8 months ago
A Time and Distance - Based Multicast Algorithm for IPv6 Mobile Networks
IP multicasting has naturally been considered the ideal technique to be used with multimedia communications. Unfortunately, current multicast protocols do not consider the dynamic...
Wu-Hsiao Hsu, Bin-Hau Lee, Ming-Han Liu, Bor-Yeh S...