• No results found

mac scheme

Non-adaptive  Group-Testing  Aggregate  MAC  Scheme

Non-adaptive Group-Testing Aggregate MAC Scheme

... GTA MAC and its security requirements are ...GTA MAC scheme is presented. It can be applied to any aggregate MAC scheme formalized by Katz and Lindell ...GTA MAC scheme ...

15

A Hierarchical Polling-based MAC Scheme for Wireless Body Sensor Network

A Hierarchical Polling-based MAC Scheme for Wireless Body Sensor Network

... [21] MAC schemes using this mode were ...access scheme that avoids the need for periodical ...a scheme that exchanges the normal polling operation mode to the urgent polling operation mode in case of ...

10

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1

... of MAC is to coordinate the channel access in an orderly manner among the mobile nodes such that efficiency can be ...the MAC in a mobile ad hoc network supporting voice ...a MAC scheme should ...

23

Collision Detection and the Design of Fair and Stable MAC Scheme for Wireless Ad Hoc Networks

Collision Detection and the Design of Fair and Stable MAC Scheme for Wireless Ad Hoc Networks

... (5) CDMB-MAC can provide perfect long-term and short- term fairness and stability performance while maintain- ing a good aggregate. Especially, from Equation (4) and (5), we can deduce a following important fact. ...

6

Energy-Saving MAC Scheme with Dynamic Transmission Thresholds for Body Sensor Networks

Energy-Saving MAC Scheme with Dynamic Transmission Thresholds for Body Sensor Networks

... In this research, energy-saving MAC scheme with dynamic transmission thresholds for body sensor networks is proposed. Dynamic transmission thresholds can limit the transmitted data. The more valuable ...

6

A Black hole Detection Algorithm in MANETS Using MAC Scheme

A Black hole Detection Algorithm in MANETS Using MAC Scheme

... Abstract: Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR and AODV protocol is threaded bydifferent types of attacks. Mobile Adhoc ...

8

An Energy Efficient Multichannel Mac Protocols To Convey Bursty Data By Y MAC

An Energy Efficient Multichannel Mac Protocols To Convey Bursty Data By Y MAC

... cycling scheme, DMM-MAC effectively conserves energy and efficiently delivers burst ...contention-based MAC scheme is preferred. Also note that DMM-MAC is a MAC protocol that is ...

7

Mac OSX Server

Mac OSX Server

... You may want to store home directories for users with last names from A to F on one computer, G to J on another, and so on. Or you may want to store home directories on a Mac OS X Server but store user and group ...

622

MAC Authentication Bypass

MAC Authentication Bypass

... with MAC address ...client MAC address in its attribute list (FILTER_1 and ...client MAC address is listed in an attribute list (FILTER_1), the client is allowed to join the WLAN (WLAN_1) that is ...

10

Approximate multipliers for MAC

Approximate multipliers for MAC

... The goal of this work is to find an approximate design of an 8 bit MAC which has the lowest cost for a given quality or the best accuracy for a given cost. The algorithm achieves this and outputs the optimal ...

40

MAC Protocols for WBAN

MAC Protocols for WBAN

... as MAC protocols are not easy to use in WSN-HEAP because it needs time ...different MAC protocols is conducted in [20] and [21] based on CSMA based and polling based techniques for ...four MAC ...

7

Reduce the Congestion in Control Channel of MAC Layer of VANET using MAC Protocols

Reduce the Congestion in Control Channel of MAC Layer of VANET using MAC Protocols

... multi-channel MAC protocol for vehicular network with adaptive ...multichannel MAC protocol proposed for quality of service in ...free MAC are ...

10

How To Use A Docushare Client On A Pc Or Mac Or Mac With A Powerbook Or Mac (For A Powerpoint) With A Docushare (For An Older Computer) With An Office 3.5 Or Powerbook (For

How To Use A Docushare Client On A Pc Or Mac Or Mac With A Powerbook Or Mac (For A Powerpoint) With A Docushare (For An Older Computer) With An Office 3.5 Or Powerbook (For

... - Saving an HTML file and its linked files to a collection that contains an HTML file with the same name DocuShare Client does not display a message when you are checking in an HTML file[r] ...

10

Mac Integration Basics Adding a Mac to a Network That Uses Windows or Other Standards

Mac Integration Basics Adding a Mac to a Network That Uses Windows or Other Standards

... new Mac, you can install Windows 7 or Windows 8 operating systems and run them at native speeds with Boot ...your Mac using either OS X or Windows. Or, if you want to run Windows and Mac apps at the ...

61

How To Balance Out The Power Of The Usg On A Network On A Pc Or Mac Mac 2.5 (For A Mac 2) On A 2G Network On An Ipnet 2.2 (For An Ipro) On An Un

How To Balance Out The Power Of The Usg On A Network On A Pc Or Mac Mac 2.5 (For A Mac 2) On A 2G Network On An Ipnet 2.2 (For An Ipro) On An Un

... The company has two WAN connections for sharing outbound internet traffic. WAN1 uses static IP, and WAN2 uses a PPPoE connection. Since WAN1 ISP is also the company’s VoIP provider, the[r] ...

88

Comparison of proposed Solar Energy Harvesting Energy Efficient MAC (SEHEE-MAC) with ZigBee and Preamble MAC for SHM in Wireless Sensor Network

Comparison of proposed Solar Energy Harvesting Energy Efficient MAC (SEHEE-MAC) with ZigBee and Preamble MAC for SHM in Wireless Sensor Network

... Paek et al. continued the Wisden system research and development. For this study modifications were made to the Wisden system which included increasing the sampling frequency from 50 Hz to 200 Hz and modifying the data ...

9

How To Set A Group Policy On A Computer With A Network Security Policy On Itunes.Com (For Acedo) On A Pc Or Mac Mac (For An Ubuntu) On An Ubode (For Mac) On Pc Or Ip

How To Set A Group Policy On A Computer With A Network Security Policy On Itunes.Com (For Acedo) On A Pc Or Mac Mac (For An Ubuntu) On An Ubode (For Mac) On Pc Or Ip

... You can configure the Audit policy settings in Windows Vista at the following location in the Group Policy Object Editor: Computer Configuration\Windows Settings\Security Settings \Loc[r] ...

339

An efficient MAC based scheme against pollution attacks in XOR network coding enabled WBANs for remote patient monitoring systems

An efficient MAC based scheme against pollution attacks in XOR network coding enabled WBANs for remote patient monitoring systems

... Each non-source node (i.e., intermediate and destination nodes) holds a key which was distributed by the KDC as it has been mentioned in the Setup phase. Using this key, the non-source node decrypts the corresponding ...

10

MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation

MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation

... We propose three applications for the MITB. Each provides improved resilience against host compromise. All properties we mention have been verified using off-the-shelf protocol verification tools. As protocols are ...

35

How To Send From A Netbook To A Spam Box On A Pc Or Mac Or Mac (For A Mac) On A Mac Or Ipo (For An Ipo) On An Ipot Or Ipot (For Mac) (For

How To Send From A Netbook To A Spam Box On A Pc Or Mac Or Mac (For A Mac) On A Mac Or Ipo (For An Ipo) On An Ipot Or Ipot (For Mac) (For

... Pop filter will run when this system checking the same interface and port. You should configure the same information in both pop filter and this system.. Pop to SMTP filter will run whe[r] ...

15

Show all 6764 documents...

Related subjects