Sciweavers

2162 search results - page 131 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
JCM
2006
101views more  JCM 2006»
13 years 9 months ago
On the Analysis of Mobility Mechanisms in Micro Mobile MPLS Access Networks
Abstract--One of the major challenges for the nextgeneration mobile systems is related to efficient mobility management issue. In this paper, we propose a new micromobility managem...
Rami Langar, Nizar Bouabdallah, Samir Tohmé
GLOBECOM
2010
IEEE
13 years 7 months ago
Trust Management for Encounter-Based Routing in Delay Tolerant Networks
: We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate trust evaluation...
Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee ...
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
CNSR
2006
IEEE
136views Communications» more  CNSR 2006»
14 years 3 months ago
Combining Petri Nets and ns-2: A Hybrid Method for Analysis and Simulation
Network protocol performance and evaluation study is often carried out using a couple of widely used simulation toolkits, such as ns-2 and OPNET. These toolkits usually contain ma...
Qiang Ye, Mike H. MacGregor