نتایج جستجو برای: broadcast protocol

تعداد نتایج: 276278  

2001
Kam-Yiu Lam Edward Chan

In this paper, we study the data inconsistency problem in data broadcast to mobile transactions. While data items in a mobile computing system are being broadcast, update transactions may install new values for the data items. If the executions of update transactions and broadcast of data items are interleaved without any control, the transactions generated by mobile clients, called mobile tran...

2014
Fanzi Zeng Yuting Tang Jianjie Pu

Considering the limited resources and the dynamic spectrum distribution in the cognitive radio sensor networks (CRSN), a half-duplex Multichannel broadcast protocol for CRSN is presented based on the home channel. This protocol maintains the networks topology only through the home channel, so there is no need for the public channel to transmit the control information and no need for the synchro...

Journal: :EURASIP J. Wireless Comm. and Networking 2007
Michael D. Colagrosso

Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET). We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and rou...

Journal: :Inf. Comput. 1987
Gabriel Bracha

A consensus protocol enables a system of n asynchronous processes, some of them faulty, to reach agreement. Both the processes and the message system are capable of cooperating to prevent the correct processes from reaching decision. A protocol is t-resilient if in the presence of up to t faulty processes it reaches agreement with probability 1. Byzantine processes are faulty processes that can...

2012
Ranjit Kumaresan

Title of dissertation: BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS Ranjit Kumaresan, Doctor of Philosophy, 2012 Dissertation directed by: Professor Jonathan Katz Department of Computer Science Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party computation. These protocols are required to be resilient ...

2005
José Maria Monteiro Angelo Brayner

A wireless broadcast environment is defined as a mobile computing environment in which data are delivered to mobile clients by means of a broadcast-based mechanism. Of course, those applications have to see the most recent consistent database state. For that reason, in such a scenario, database servers should synchronize operations for ensuring data consistency and currency of data. However, co...

1993
Akihito Nakamura Makoto Takizawa

This paper presents a HiPO (High-sPeed Orderpreserving broadcast) protocol which provides highthroughput group communication service on a highspeed single channel network like FDDI. By the HiPO protocol, every application entity can atomically receive all the messages broadcast in the group in the same order as they were sent. This service is an OP (orderpreserving broadcast) one. The execution...

2005
Guojun Wang Dingzhu Lu Weijia Jia Jiannong Cao

Based on existing reliable broadcast protocols in MANETs, we propose a novel reliable broadcast protocol that uses clustering technique and gossip methodology. We combine local retransmission and gossip mechanisms to provide reliability in MANETs. The proposed protocol can dynamically change system parameters for reliable broadcast communication in order to improve the adaptability in the rapid...

2016
G Mary Valantina S Jayashri

Saving human life is the most important task than anything else. Day to day life faces loss of life due to accidents which can be avoided. Biologically inspired communication on road could save lots of life. A mesh sensor which is developed based on a combination of mesh router and wireless sensor can be used for communication between vehicles in a better way and could save human life. Vehicula...

2015
Marcin Andrychowicz Stefan Dziembowski

Motivated by the recent success of Bitcoin we study the question of constructing distributed cryptographic protocols in a fully peer-to-peer scenario under the assumption that the adversary has limited computing power and there is no trusted setup (like PKI, or an unpredictable beacon). We propose a formal model for this scenario and then we construct a broadcast protocol in it. This protocol i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید