| Document Date: 2007-09-28 06:20:39 Open Document File Size: 231,11 KBShare Result on Facebook
/ IndustryTerm malicious devices / time-slotted single-hop wireless radio channel / ubiquitous computing / leader election protocol / wireless network / communication protocol / sub-protocol / awake tiny devices / ad hoc network / wireless networks / honest devices / wireless coordination / energy / cryptographic solutions / broadcast protocol / wireless ad hoc network / network layer protocols / wireless ad hoc networks / n-player protocol / arbitrary n-player protocol / wireless radio channels / malicious device / wireless devices / / NaturalFeature Multiple Access Channel / / Organization MIT / / Person Lower Bound / Bob / Alice / A. Alice / Collin / / Position player / simulated player / fellow honest player / Leader leader / Safety leader / malicious player / / RadioStation Katz / / Technology leader election protocol / arbitrary n-player protocol / wireless devices / else return 1 Algorithm / 3-player communication protocol / Bit Broadcast Sub-Protocol / network layer protocols / Public key / simulation / TDMA / n-player protocol / round-based protocols / /
SocialTag |