Sciweavers

182 search results - page 19 / 37
» A formal framework for the performance analysis of P2P netwo...
Sort
View
CNSR
2007
IEEE
158views Communications» more  CNSR 2007»
13 years 9 months ago
Bounding the Information Collection Performance of Wireless Sensor Network Routing
Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In orde...
Qinghua Wang, Tingting Zhang, Stefan Pettersson
MSWIM
2006
ACM
14 years 1 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi

Publication
152views
13 years 10 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
TMC
2011
223views more  TMC 2011»
13 years 2 months ago
Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis
Abstract—Recently, many efforts have been made to develop more efficient Inter-Vehicle Communication (IVC) protocols for ondemand route planning according to observed traffic con...
Christoph Sommer, Reinhard German, Falko Dressler
RV
2009
Springer
101views Hardware» more  RV 2009»
14 years 2 months ago
DMaC: Distributed Monitoring and Checking
Abstract. We consider monitoring and checking formally specified properties in a network. We are addressing the problem of deploying the checkers on different network nodes that ...
Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup ...