Sciweavers

981 search results - page 15 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
CCR
1998
75views more  CCR 1998»
13 years 7 months ago
A comparative analysis of groupware application protocols
Two of the most difficult problems faced by developers of synchronous groupware applications are the handling of multiple session connections and the maintenance of replicated dat...
Mark Pendergast
BROADNETS
2006
IEEE
14 years 1 months ago
Performance Analysis of Soft-State Lightpath Management in GMPLS-Based WDM Networks
RSVP–TE is a signaling protocol to setup and teardown lightpaths in wavelength–routed GPMLS networks. RSVP– TE uses the soft–state control mechanism to manage lightpaths. ...
Shinya Ishida, Shin'ichi Arakawa, Masayuki Murata
VTC
2010
IEEE
159views Communications» more  VTC 2010»
13 years 5 months ago
Architectural Analysis of a Smart DMA Controller for Protocol Stack Acceleration in LTE Terminals
—In this paper we present an architectural analysis of a smart DMA (sDMA) controller for protocol stack acceleration in mobile devices supporting 3GPP’s Long Term Evolution (LT...
Sebastian Hessel, David Szczesny, Felix Bruns, Att...
JCS
2010
80views more  JCS 2010»
13 years 2 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
JSS
2010
208views more  JSS 2010»
13 years 5 months ago
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks
This paper investigates a class of mobile wireless sensor networks that are unconnected most of the times; we refer to them as delay–tolerant wireless sensor networks (DTWSN). T...
Abbas Nayebi, Hamid Sarbazi-Azad, Gunnar Karlsson