Compulsory Protocols 1.1 Overview

نویسنده

  • Nancy Lynch
چکیده

Readings: Compulsory protocols H̄atzis, Pentaris, Spirakis, Tampakas, Tan. Fundamental control algorithms in mobile networks. Chatzigiannakis, Nikoletseas, Spirakis. On the average and worse-case efficiency of some new distributed communication and control algorithms for ad hoc networks. Chatzigiannakis, Nikoletseas, Spirakis. An efficient communication strategy for ad-hoc mobile networks. Chatzigiannakis, Nikoletseas, Spirakis. An efficient routing protocol for hierarchical ad-hoc mobile networks. Virtual nodes: Virtual mobile nodes paper Virtual stationary nodes paper Home location paper (optional)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Privacy Preserving Distributed Data Mining Protocols

.............................................................................................ii Declaration ..........................................................................................iii Acknowledgement .................................................................................iv Basic definitions ................................................................................

متن کامل

Involuntary hospitalization – German court proceedings 1992–2005

Background An overview of compulsory admission and civil commitment in Germany is presented. Legal, administrative, and methodological aspects are described. The expiry of compulsory admission or retention in a closed psychiatric ward is not strictly identical to legal commitment. In Germany, civil commitment (a form of guardianship) is regulated on a nationwide basis. Public commitment (throug...

متن کامل

An Experimental Study of Basic Communication Protocols in Ad-hoc Mobile Networks

We investigate basic communication protocols in ad-hoc mobile networks. We follow the semi-compulsory approach according to which a small part of the mobile users, the support Σ, that moves in a predetermined way is used as an intermediate pool for receiving and delivering messages. Under this approach, we present a new semi-compulsory protocol called the runners in which the members of Σ perfo...

متن کامل

The Dining Freemasons

We continue the popular theme of offline security by considering how computer security might be applied to the challenges presented in running a secret society. We discuss membership testing problems and solutions, set in the context of security authentication protocols, and present new building blocks which could be used to generate secret society protocols more robustly and generically, inclu...

متن کامل

210408 nr2 Ray Cognitrace boekje blauw

1. Short introduction into neurophysiological assessment 2 1.1. Introducing EEG recording, EEG spectrum analysis and Event Related Potential analysis 2 1.2. Description of several EP and ERP protocols with relevance to psychiatry 8 2. Rationale of the use of EEG/EP/ERP protocols in psychiatry 14 2.1 Improved diagnostic precision 14 2.2. Better predicted treatment response 20 2.3. Shortened time...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006