Sciweavers

2162 search results - page 165 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
SRDS
2008
IEEE
14 years 4 months ago
Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols
Large-scale distributed systems are subject to churn, i.e., continuous arrival, departure and failure of processes. Analysis of protocols under churn requires one to use churn mod...
Steven Y. Ko, Imranul Hoque, Indranil Gupta
IWCMC
2009
ACM
14 years 4 months ago
Carrier sense multiple access with enhanced collision avoidance: a performance analysis
Abstract—Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a recently proposed modification to the well-known CSMA/CA protocol. By using a determinis...
Jaume Barceló, Boris Bellalta, Cristina Can...
ICC
2007
IEEE
104views Communications» more  ICC 2007»
14 years 4 months ago
IPSec: Performance Analysis and Enhancements
Abstract— Internet Protocol Security (IPSec) is a widely deployed mechanism for implementing Virtual Private Networks (VPNs). In previous work, we examined the overheads incurred...
Craig A. Shue, Minaxi Gupta, Steven A. Myers
ICPADS
2007
IEEE
14 years 4 months ago
Supporting deadline monotonic policy over 802.11 average service time analysis
In this paper, we propose a real time scheduling policy over 802.11 DCF protocol called Deadline Monotonic (DM). We evaluate the performance of this policy for a simple scenario w...
Inès El Korbi, Leïla Azouz Saïdan...
SASN
2003
ACM
14 years 3 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras