نتایج جستجو برای: communication protocol
تعداد نتایج: 569116 فیلتر نتایج به سال:
Group communication can benefit from Internet Protocol (IP) multicast protocol to achieve efficient exchange of messages. However, IP multicast does not provide any mechanisms for authentication. In literature, many solutions to solve this problem were presented. It has been shown that Wong and Lam protocol is the only protocol that can resist both packet loss and pollution attacks. In contrast...
We present a new protocol for realizing reversible distributed programs with CSP style communication. While this work was motivated by the desire to implement reversible process algebras, the protocol may have other interesting uses in distributed systems including checkpointing, speculative real-time simulation, and transaction synchronization. The protocol may be efficiently implemented in ha...
In this paper, we propose an efficient and a scalable protocol for secure multicast communication. This protocol is based on the Iolus and the logical key hierarchy protocols. It divides the whole group into several subgroups as in the Iolus protocol. Each subgroup in turn is organized in a logical key hierarchy as in the LKH protocol. This decomposition reduces the complexity for a member join...
This paper presents a concept of self-configuring mobile communication devices, such as sensor cluster heads, car mounted communication gateways etc. supporting the autonomous control of logistic goods. The main idea is to select and configure the communication network, service and protocol in a self-organised way at the mobile device, rather than initiating the networks, protocol and service s...
We translate the problem of designing a secure communications protocol for several users communicating through a relay in a wireless network into understanding certain subvarieties of products of Grassmannians. We calculate the dimension of these subvarieties and provide various results concerning their defining equations. When the relay and all of the users have the same number of antennas, th...
A variety of communications architectures, protocols, and management systems necessitates methods and tools for integration of these communications systems components on a variety of different integration levels. No general integration methods exist today which are applicable to the integration of architectures, protocols, and systems. In this article we argue that metacommunication, i.e. commu...
The use of virtual industrial devices, i.e., software components in the form of objects, for representing real industrial devices is a widely accepted approach when modelling industrial plants. Object-oriented middleware integration technologies are usually used as communication backbones to support the communication services that virtual industrial devices require. However, such middleware tec...
Cognitive Radio (CR) is an intelligent radio that can dynamically access the radio spectrum. Secondary users in Cognitive Radio Network (CRN) can access the licensed spectrum without causing harmful interference to primary users. The performance of cognitive radio networking functionalities depends on the properties of the spectrum band in use. This necessitates a crosslayer design in the entir...
We present an efficient and optimally resilient Asynchronous Byzantine Agreement (ABA) protocol involving n = 3t+1 parties over a completely asynchronous network, tolerating a computationally unbounded Byzantine adversary, who can control at most t parties out of the n parties. The amortized communication complexity of our ABA protocol is O(n log 1 ) bits for attaining agreement on a single bit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید