Login / Signup
A bound on the capacity of backoff and acknowledgment-based protocols.
Leslie Ann Goldberg
Mark Jerrum
Sampath Kannan
Mike Paterson
Published in:
SIAM J. Comput. (2004)
Keyphrases
</>
upper bound
worst case
lower bound
genetic algorithm
security protocols
high capacity
data mining
case study
multi agent
end to end
window size