Compulsory Protocols 1.1 Overview
نویسنده
چکیده
Readings: Compulsory protocols H̄atzis, Pentaris, Spirakis, Tampakas, Tan. Fundamental control algorithms in mobile networks. Chatzigiannakis, Nikoletseas, Spirakis. On the average and worse-case efficiency of some new distributed communication and control algorithms for ad hoc networks. Chatzigiannakis, Nikoletseas, Spirakis. An efficient communication strategy for ad-hoc mobile networks. Chatzigiannakis, Nikoletseas, Spirakis. An efficient routing protocol for hierarchical ad-hoc mobile networks. Virtual nodes: Virtual mobile nodes paper Virtual stationary nodes paper Home location paper (optional)
منابع مشابه
Analysis of Privacy Preserving Distributed Data Mining Protocols
.............................................................................................ii Declaration ..........................................................................................iii Acknowledgement .................................................................................iv Basic definitions ................................................................................
متن کاملInvoluntary hospitalization – German court proceedings 1992–2005
Background An overview of compulsory admission and civil commitment in Germany is presented. Legal, administrative, and methodological aspects are described. The expiry of compulsory admission or retention in a closed psychiatric ward is not strictly identical to legal commitment. In Germany, civil commitment (a form of guardianship) is regulated on a nationwide basis. Public commitment (throug...
متن کاملAn Experimental Study of Basic Communication Protocols in Ad-hoc Mobile Networks
We investigate basic communication protocols in ad-hoc mobile networks. We follow the semi-compulsory approach according to which a small part of the mobile users, the support Σ, that moves in a predetermined way is used as an intermediate pool for receiving and delivering messages. Under this approach, we present a new semi-compulsory protocol called the runners in which the members of Σ perfo...
متن کاملThe Dining Freemasons
We continue the popular theme of offline security by considering how computer security might be applied to the challenges presented in running a secret society. We discuss membership testing problems and solutions, set in the context of security authentication protocols, and present new building blocks which could be used to generate secret society protocols more robustly and generically, inclu...
متن کامل210408 nr2 Ray Cognitrace boekje blauw
1. Short introduction into neurophysiological assessment 2 1.1. Introducing EEG recording, EEG spectrum analysis and Event Related Potential analysis 2 1.2. Description of several EP and ERP protocols with relevance to psychiatry 8 2. Rationale of the use of EEG/EP/ERP protocols in psychiatry 14 2.1 Improved diagnostic precision 14 2.2. Better predicted treatment response 20 2.3. Shortened time...
متن کامل