Login / Signup

A bound on the capacity of backoff and acknowledgment-based protocols.

Leslie Ann GoldbergMark JerrumSampath KannanMike Paterson
Published in: SIAM J. Comput. (2004)
Keyphrases
  • upper bound
  • worst case
  • lower bound
  • genetic algorithm
  • security protocols
  • high capacity
  • data mining
  • case study
  • multi agent
  • end to end
  • window size