Sciweavers

2162 search results - page 66 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
14 years 28 days ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
ADHOC
2008
95views more  ADHOC 2008»
13 years 9 months ago
The polarized gossip protocol for path discovery in MANETs
In this paper we present a novel probabilistic protocol for path discovery in Mobile Ad Hoc Networks (MANETs). The protocol implements what we call a polarized gossiping algorithm...
Roberto Beraldi
TON
1998
87views more  TON 1998»
13 years 8 months ago
Adaptive hybrid clock discipline algorithm for the network time protocol
This paper describes the analysis, implementation and performance of a new algorithm engineered to discipline a computer clock to a source of standard time, such as a GPS receiver...
David L. Mills
TELSYS
2010
122views more  TELSYS 2010»
13 years 7 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...