Browsing by Subject "Unreliable communication"
Now showing items 1-5 of 5
-
Article
Adaptive packet scheduling over a wireless channel under constrained jamming
(2017)In this work we consider the communication over a wireless link, between a sender and a receiver, being disrupted by a jammer. The objective of the sender is to transmit as much data as possible to the receiver in the most ...
-
Article
Adaptive scheduling over a wireless channel under constrained jamming
(2015)We consider a wireless channel between a single pair of stations (sender and receiver) that is being “watched” and disrupted by a malicious, adversarial jammer. The sender’s objective is to transmit as much useful data as ...
-
Conference Object
Algorithmic mechanisms for internet supercomputing under unreliable communication
(2011)This work, using a game-theoretic approach, considers Internet-based computations, where a master processor assigns, over the Internet, a computational task to a set of untrusted worker processors, and collects their ...
-
Article
Algorithmic mechanisms for reliable master-worker internet-based computing
(2014)We consider Internet-based master-worker computations, where a master processor assigns, across the Internet, a computational task to a set of untrusted worker processors, and collects their responses. Examples of such ...
-
Article
Packet scheduling over a wireless channel: AQT-based constrained jamming
(2015)In this paper we consider a two-node setting with a sender transmitting packets to a receiver over a wireless channel. Unfortunately, the channel can be jammed, thus corrupting the packet that is being transmitted at the ...