Sciweavers

1653 search results - page 173 / 331
» Timed analysis of security protocols
Sort
View
TMC
2010
142views more  TMC 2010»
15 years 1 months ago
DGRAM: A Delay Guaranteed Routing and MAC Protocol for Wireless Sensor Networks
This paper presents an integrated MAC and routing protocol called Delay Guaranteed Routing and MAC (DGRAM) for delay sensitive wireless sensor network (WSN) applications. DGRAM is...
Shanti Chilukuri, Anirudha Sahoo
136
Voted
ADHOC
2006
86views more  ADHOC 2006»
15 years 3 months ago
Energy considerations for topology-unaware TDMA MAC protocols
Since the energy budget of mobile nodes is limited, the performance of a networking protocol for such users should be evaluated in terms of its energy efficiency, in addition to t...
Konstantinos Oikonomou, Ioannis Stavrakakis
128
Voted
ENTCS
2006
117views more  ENTCS 2006»
15 years 3 months ago
A Formalization of Credit and Responsibility Within the GNDC Schema
We formally define a notion of credit and responsibility within the Generalized Non Deducibility on Compositions framework. We investigate the validity of our definitions through ...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
157
Voted
CORR
2004
Springer
142views Education» more  CORR 2004»
15 years 3 months ago
Dynamic Localization Protocols for Mobile Sensor Networks
The ability of a sensor node to determine its physical location within a network (Localization) is of fundamental importance in sensor networks. Interpretating data from sensors i...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
STOC
2001
ACM
104views Algorithms» more  STOC 2001»
16 years 3 months ago
Spatial gossip and resource location protocols
The dynamic behavior of a network in which information is changing continuously over time requires robust and efficient mechanisms for keeping nodes updated about new information. ...
David Kempe, Jon M. Kleinberg, Alan J. Demers