نتایج جستجو برای: contention based
تعداد نتایج: 2939872 فیلتر نتایج به سال:
CPU port contention has been used in the last years as a stateless side channel to perform side-channel attacks and transient execution attacks. One drawback of this is that it heavily relies on simultaneous multi-threading, which can be absent from some CPUs or simply disabled by OS. In paper, we present sequential contention, does not require SMT. It exploits sub-optimal scheduling ports for ...
Time Split-Token Based Contention Resolution (TS-TBCR) Protocol for Integrated Voice and Data Service over Wireless LAN's Dhadesugoor R. Vaman & Sharad Kumar Dept. of EE/CS Stevens Institute of Technology Hoboken, NJ 07030 Tel: (201) 216 5057 Fax: (201) 2168246 Email: bis _ d [email protected] This paper proposes a time split channel access with token based contention resolution (TS...
In M2M communication, there is critical requirement of robust MAC protocol to enable multiple M2M devices to access the channel. For this purpose, a frame based hybrid MAC protocol consisting of CSMA-based contention period and TDMA based transmission period is presented in the literature. During contention period, the devices compete for the channel access and those devices which win a slot in...
Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we c...
This paper analyzes the transmission of voice and data over an 802.11 Wireless Local Area Network (WLAN). The data is transmitted in a contention based access period, while the voice samples are transmitted during a contention free period, based on a polling scheme. Because statistical multiplexing can be utilized, speech may be outdated when a poll arrives. The portion of outdated speech is th...
There are currently two approaches to providing Byzantine-fault-tolerant state machine replication: a replica-based approach, e.g., BFT, that uses communication between replicas to agree on a proposed ordering of requests, and a quorum-based approach, such as Q/U, in which clients contact replicas directly to optimistically execute operations. Both approaches have shortcomings: the quadratic co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید