22,768 research outputs found

    Effects of Rate Adaption on the Throughput of Random Ad Hoc Networks

    No full text
    The capacity of wireless ad hoc networks has been studied in an excellent treatise by Gupta and Kumar [1], assuming a fixed transmission rate. By contrast, in this treatise we investigate the achievable throughput improvement of rate adaptation in the context of random ad hoc networks, which have been studied in conjunction with a fixed transmission rate in [1]. Our analysis shows that rate adaptation has the potential of improving the achievable throughput compared to fixed rate transmission, since rate adaptation mitigates the effects of link quality fluctuations. However, even perfect rate control fails to change the scaling law of the per-node throughput result given in [1], regardless of the absence or presence of shadow fading. This result is confirmed in the context of specific adaptive modulation aided design examples

    Foundations, Properties, and Security Applications of Puzzles: A Survey

    Full text link
    Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of a certain amount of resources to be solved, hence introducing a cost that is often regarded as a time delay---though it could involve other metrics as well, such as bandwidth. These powerful features have made puzzles the core of many security protocols, acquiring increasing importance in the IT security landscape. The concept of a puzzle has subsequently been extended to other types of schemes that do not use cryptographic functions, such as CAPTCHAs, which are used to discriminate humans from machines. Overall, puzzles have experienced a renewed interest with the advent of Bitcoin, which uses a CPU-intensive puzzle as proof of work. In this paper, we provide a comprehensive study of the most important puzzle construction schemes available in the literature, categorizing them according to several attributes, such as resource type, verification type, and applications. We have redefined the term puzzle by collecting and integrating the scattered notions used in different works, to cover all the existing applications. Moreover, we provide an overview of the possible applications, identifying key requirements and different design approaches. Finally, we highlight the features and limitations of each approach, providing a useful guide for the future development of new puzzle schemes.Comment: This article has been accepted for publication in ACM Computing Survey
    • …
    corecore