Sciweavers

252 search results - page 36 / 51
» Timing Analysis of the FlexRay Communication Protocol
Sort
View
GLOBECOM
2010
IEEE
14 years 12 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...
POPL
2007
ACM
16 years 2 months ago
Specialization of CML message-passing primitives
Concurrent ML (CML) is a statically-typed higher-order concurrent language that is embedded in Standard ML. Its most notable feature is its support for first-class synchronous ope...
John H. Reppy, Yingqi Xiao
INFOCOM
2007
IEEE
15 years 8 months ago
Broadcast Flooding Revisited: Survivability and Latency
—This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing is...
Petteri Mannersalo, Alireza Keshavarz-Haddad, Rudo...
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 8 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
CORR
2011
Springer
143views Education» more  CORR 2011»
14 years 5 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman