Sciweavers

2162 search results - page 58 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
TPDS
2008
76views more  TPDS 2008»
13 years 8 months ago
How to Choose a Timing Model
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer
ACSW
2006
13 years 10 months ago
Modelling denial of service attacks on JFK with Meadows's cost-based framework
We present the first detailed application of Meadows's cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two ...
Jason Smith, Juan Manuel González Nieto, Co...
INFOCOM
2012
IEEE
12 years 7 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
SPW
1999
Springer
14 years 1 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
ICALP
2000
Springer
14 years 10 days ago
A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols
We study contention-resolution protocols for multiple-access channels. We show that every backoff protocol is transient if the arrival rate, , is at least 0.42 and that the capaci...
Leslie Ann Goldberg, Mark Jerrum, Sampath Kannan, ...