Sciweavers

168 search results - page 9 / 34
» A Model of Computation for the NRL Protocol Analyzer
Sort
View
NCA
2003
IEEE
14 years 19 days ago
Performance Analysis of an Application-level Cooperative Control Protocol
This paper proposes the modeling and the performance analysis of a high-level control protocol – COCOP, which enables cooperative groups of clients to control a shared server de...
Giancarlo Fortino, Carlo Mastroianni, Wilma Russo
IPPS
2006
IEEE
14 years 1 months ago
A design of overlay anonymous multicast protocol
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...
ICDCS
2005
IEEE
14 years 29 days ago
Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout
We propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossipbased protocol using adaptive fanout. We model three versions of go...
Satish Verma, Wei Tsang Ooi
ATC
2007
Springer
14 years 1 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
INFOCOM
2002
IEEE
14 years 8 days ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...