Sciweavers

4305 search results - page 169 / 861
» Analysing Protocol Implementations
Sort
View
SAS
1999
Springer
117views Formal Methods» more  SAS 1999»
14 years 1 months ago
Abstracting Cryptographic Protocols with Tree Automata
ing Cryptographic Protocols with Tree Automata David Monniaux http://www.di.ens.fr/%7Fmonniaux, Laboratoire d’Informatique, ´Ecole Normale Sup´erieure, 45 rue d’Ulm , 75230 P...
David Monniaux
ICCAD
1994
IEEE
127views Hardware» more  ICCAD 1994»
14 years 1 months ago
Synthesis of concurrent system interface modules with automatic protocol conversion generation
-- We describe a new high-level compiler called Integral fordesigning system interface modules. The inputis a high-levelconcurrent algorithmic specification that can model complex ...
Bill Lin, Steven Vercauteren
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 8 months ago
Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee
Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worstcase sys...
Kenneth W. Shum, Wing Shing Wong
EWSN
2009
Springer
14 years 9 months ago
Multi-hop Cluster Hierarchy Maintenance in Wireless Sensor Networks: A Case for Gossip-Based Protocols
Multi-hop cluster hierarchy has been presented as an organization for large wireless sensor networks (WSNs) that can provide scalable routing, data aggregation, and querying. In th...
Konrad Iwanicki, Maarten van Steen
ICCCN
2007
IEEE
14 years 3 months ago
A Fast Delivery Protocol for Total Order Broadcasting
Abstract—Sequencer, privilege-based, and communication history algorithms are popular approaches to implement total ordering, where communication history algorithms are most suit...
Li Ou, Xubin He, Christian Engelmann, Stephen L. S...