No abstract available.
RFC Downloads
Cited By
- Chen M and Zadok E Kurma Proceedings of the 12th ACM International Conference on Systems and Storage, (109-120)
- Giallanza T, Siems T, Smith E, Gabrielsen E, Johnson I, Thornton M and Larson E (2019). Keyboard Snooping from Mobile Phone Arrays with Mixed Convolutional and Recurrent Neural Networks, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3:2, (1-22), Online publication date: 21-Jun-2019.
- Bender M, Fineman J, Gilbert S and Young M (2018). Scaling Exponential Backoff, Journal of the ACM, 66:1, (1-33), Online publication date: 12-Jan-2019.
- Lauzon J, Grondin F, Létourneau D, Desbiens A and Michaud F Localization of RW-UAVs using particle filtering over distributed microphone arrays 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (2479-2484)
- Bondavalli A, Brancati F, Ceccarelli A, Falai L and Vadursi M (2013). Resilient estimation of synchronisation uncertainty through software clocks, International Journal of Critical Computer-Based Systems, 4:4, (301-322), Online publication date: 1-Feb-2013.
- Lin T, Chang K, Tian J, Chu H and Huang P Modeling and simulation comparison of two time synchronization protocols Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, (117-123)
- Veitch D, Babu S and Pàsztor A Robust synchronization of software clocks across the internet Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (219-232)
- Liang Y, Steinbach E and Girod B Real-time voice communication over the internet using packet path diversity Proceedings of the ninth ACM international conference on Multimedia, (431-440)
- Stoller S (2000). Detecting global predicates in distributed systems with clocks, Distributed Computing, 13:2, (85-98), Online publication date: 1-Apr-2000.
- Levine B, Paul S and Garcia-Luna-Aceves J Organizing multicast receivers deterministically by packet-loss correlation Proceedings of the sixth ACM international conference on Multimedia, (201-210)
- Davis D and Geer D Kerberos security with clocks adrift Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (4-4)
- Campbell A, Coulson G, García F and Hutchison D (1992). A continuous media transport and orchestration service, ACM SIGCOMM Computer Communication Review, 22:4, (99-110), Online publication date: 1-Oct-1992.
- Campbell A, Coulson G, García F and Hutchison D A continuous media transport and orchestration service Conference proceedings on Communications architectures & protocols, (99-110)
- Baugher M Media transports and distributed multimedia flows Proceedings of the 1992 ACM/SIGAPP symposium on Applied computing: technological challenges of the 1990's, (1132-1143)
- Mills D (1989). On the Accuracy and Stablility of Clocks Synchronized by the Network Time Protocol in the Internet System, ACM SIGCOMM Computer Communication Review, 20:1, (65-75), Online publication date: 1-Dec-1989.
- Vijayalayan K and Veitch D Rot at the roots? Examining public timing infrastructure IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
Recommendations
A secure time synchronization protocol for sensor network
PAKDD'07: Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data miningClock synchronization is a critical issue in most wireless sensor network applications. Although the synchronization is well studied in last few years. Most of these synchronization protocols assume benign environments, but cannot survive malicious ...
Ratio-based time synchronization protocol in wireless sensor networks
Time synchronization plays a key role in the wireless sensor networks (WSNs). Time synchronization is realized by those messages that are time-stamped. But there are several delay times during transmission after time stamping. Most of them are uncertain ...
Network classless time protocol based on clock offset optimization
Time synchronization is critical in distributed environments. A variety of network protocols, middleware and business applications rely on proper time synchronization across the computational infrastructure and depend on the clock accuracy. The Network ...