Sciweavers

2162 search results - page 120 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast
—There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly ...
Di Niu, Baochun Li
CJ
2010
190views more  CJ 2010»
13 years 6 months ago
A Methodological Construction of an Efficient Sequentially Consistent Distributed Shared Memory
A concurrent object is an object that can be concurrently accessed by several processes. Sequential consistency is a consistency criterion for such objects. Informally, it states ...
Vicent Cholvi, Antonio Fernández, Ernesto J...
NDSS
1999
IEEE
14 years 1 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu
NETWORKING
2008
13 years 10 months ago
Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes
In this paper the authors present a simulation study of two 802.11e network scenarios. The presented analysis is not only novel but most of all crucial for understanding how a theo...
Katarzyna Kosek, Marek Natkaniec, Luca Vollero
FMOODS
2006
13 years 10 months ago
Bounded Analysis and Decomposition for Behavioural Descriptions of Components
Abstract. Explicit behavioural interfaces are now accepted as a mandatory feature of components to address architectural analysis. Behavioural interface description languages shoul...
Pascal Poizat, Jean-Claude Royer, Gwen Salaün