Sciweavers

2162 search results - page 52 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ENTCS
2007
98views more  ENTCS 2007»
13 years 8 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
ENTCS
2002
139views more  ENTCS 2002»
13 years 8 months ago
Automatic Verification of the IEEE-1394 Root Contention Protocol with KRONOS and PRISM
We report on the automatic verification of timed probabilistic properties of the IEEE 1394 root contention protocol combining two existing tools: the real-time modelchecker Kronos...
Conrado Daws, Marta Z. Kwiatkowska, Gethin Norman
INFOCOM
2010
IEEE
13 years 7 months ago
Designing a Practical Access Point Association Protocol
—In a Wireless Local Area Network (WLAN), the Access Point (AP) selection of a client heavily influences the performance of its own and others. Through theoretical analysis, we ...
Fengyuan Xu, Chiu Chiang Tan, Qun Li, Guanhua Yan,...
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 22 days ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
IJIPT
2006
58views more  IJIPT 2006»
13 years 8 months ago
On protocol engineering: detect, confirm and adjust
: In this paper, we depart from TCP-Probing (Tsaoussidis and Badr, 2000) and propose an experimental transport protocol that achieves energy and throughput performance gains in mix...
Ioannis Psaras, Lefteris Mamatas, Vassilis Tsaouss...