Sciweavers

4305 search results - page 264 / 861
» Analysing Protocol Implementations
Sort
View
LCN
2003
IEEE
14 years 3 months ago
A New Scheme for IP-based Internet-Mobility
In this contribution we present a new type of mobility management for IP-based networks that, contrary to conventional approaches, does not focus on the network layer, but on the ...
Thomas Dreibholz, Andreas Jungmaier, Michael T&uum...
EUROMICRO
1999
IEEE
14 years 2 months ago
An Improved Scheduling Technique for Time-Triggered Embedded Systems
In this paper we present an improved scheduling technique for the synthesis of time-triggered embedded systems. Our system model captures both the flow of data and that of control...
Paul Pop, Petru Eles, Zebo Peng
HOTOS
1997
IEEE
14 years 1 months ago
What Synchronous Groupware Needs: Notification Services
Synchronous groupware is the class of applications in which two or more people collaborate in what they perceive to be real time. Most previous efforts to deploy synchronous group...
Mark Day
INFOCOM
1996
IEEE
14 years 1 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
WETICE
1995
IEEE
14 years 1 months ago
Subdocument invocation semantics in collaborative hyperdocuments
In this paper we informally explain a new Trellis model that incorporates colored tokens into the previouslydescribed timed-Petri-net-based de nition. We give examples of using Tr...
Richard Furuta, Jaime Navon, P. David Stotts