Sciweavers

168 search results - page 11 / 34
» A Model of Computation for the NRL Protocol Analyzer
Sort
View
CASCON
1996
99views Education» more  CASCON 1996»
13 years 8 months ago
Modeling and analysis of the Unix communication subsystems
The performance of host communication subsystems is an important research topic in computer networks.1 Performance metrics such as throughput, delay, and packet loss are important...
Yi-Chun Chu, Toby J. Teorey
BROADNETS
2006
IEEE
14 years 1 months ago
Performance Analysis of Soft-State Lightpath Management in GMPLS-Based WDM Networks
RSVP–TE is a signaling protocol to setup and teardown lightpaths in wavelength–routed GPMLS networks. RSVP– TE uses the soft–state control mechanism to manage lightpaths. ...
Shinya Ishida, Shin'ichi Arakawa, Masayuki Murata
ICPPW
2003
IEEE
14 years 19 days ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 8 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
MSWIM
2005
ACM
14 years 28 days ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....