23,599 research outputs found
Effects of Rate Adaption on the Throughput of Random Ad Hoc Networks
The capacity of wireless ad hoc networks has been studied in an excellent treatise by Gupta and Kumar [1], assuming a fixed transmission rate. By contrast, in this treatise we investigate the achievable throughput improvement of rate adaptation in the context of random ad hoc networks, which have been studied in conjunction with a fixed transmission rate in [1]. Our analysis shows that rate adaptation has the potential of improving the achievable throughput compared to fixed rate transmission, since rate adaptation mitigates the effects of link quality fluctuations. However, even perfect rate control fails to change the scaling law of the per-node throughput result given in [1], regardless of the absence or presence of shadow fading. This result is confirmed in the context of specific adaptive modulation aided design examples
Foundations, Properties, and Security Applications of Puzzles: A Survey
Cryptographic algorithms have been used not only to create robust ciphertexts
but also to generate cryptograms that, contrary to the classic goal of
cryptography, are meant to be broken. These cryptograms, generally called
puzzles, require the use of a certain amount of resources to be solved, hence
introducing a cost that is often regarded as a time delay---though it could
involve other metrics as well, such as bandwidth. These powerful features have
made puzzles the core of many security protocols, acquiring increasing
importance in the IT security landscape. The concept of a puzzle has
subsequently been extended to other types of schemes that do not use
cryptographic functions, such as CAPTCHAs, which are used to discriminate
humans from machines. Overall, puzzles have experienced a renewed interest with
the advent of Bitcoin, which uses a CPU-intensive puzzle as proof of work. In
this paper, we provide a comprehensive study of the most important puzzle
construction schemes available in the literature, categorizing them according
to several attributes, such as resource type, verification type, and
applications. We have redefined the term puzzle by collecting and integrating
the scattered notions used in different works, to cover all the existing
applications. Moreover, we provide an overview of the possible applications,
identifying key requirements and different design approaches. Finally, we
highlight the features and limitations of each approach, providing a useful
guide for the future development of new puzzle schemes.Comment: This article has been accepted for publication in ACM Computing
Survey
- …