Sciweavers

4305 search results - page 212 / 861
» Analysing Protocol Implementations
Sort
View
ICFEM
2003
Springer
14 years 2 months ago
Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures
The verification of safety critical systems has become an area of increasing importance in computer science. The notion of reactive system has emerged to concentrate on problems r...
Mickaël Kerboeuf, David Nowak, Jean-Pierre Ta...
INFOCOM
1996
IEEE
14 years 1 months ago
RMTP: A Reliable Multicast Transport Protocol
This paper describes the design and implementation of a multicast transport protocol called RMTP. RMTP provides sequenced, lossless delivery of bulk data from one sender to a grou...
John C.-H. Lin, Sanjoy Paul
APWEB
2006
Springer
14 years 1 months ago
An Energy Efficient Cross-Layer MAC Protocol for Wireless Sensor Networks
In the area of wireless sensor networks, achieving minimum energy consumption is a very important research issue. A number of energy efficient protocols have been proposed, mostly ...
Changsu Suh, Young-Bae Ko, Dong-Min Son
CSFW
2000
IEEE
14 years 27 days ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
CCGRID
2005
IEEE
13 years 11 months ago
The Composite Endpoint Protocol (CEP): scalable endpoints for terabit flows
We introduce the Composite Endpoint Protocol (CEP) which efficiently composes a set of transmission elements to support high speed flows which exceed the capabilities of a single...
Eric Weigle, Andrew A. Chien