Sciweavers

4305 search results - page 285 / 861
» Analysing Protocol Implementations
Sort
View
ICDCS
1999
IEEE
15 years 7 months ago
NAP: Practical Fault-Tolerance for Itinerant Computations
NAP, a detection and recovery based scheme for implementing fault-tolerant itinerant computations, is presented. We give the semantics for the scheme and describe a protocol that ...
Dag Johansen, Keith Marzullo, Fred B. Schneider, K...
GLOBECOM
2006
IEEE
15 years 8 months ago
On the Impact of Clear Channel Assessment on MAC Performance
— Clear Channel Assessment (CCA) is an essential ingredient in wireless networks employing channel sensing as part of their medium access mechanism. While CCA itself is implement...
Iyappan Ramachandran, Sumit Roy
109
Voted
SAINT
2003
IEEE
15 years 7 months ago
Problems and Tentative solutions in InternetCAR testing with IPv6
Vehicle environment is a good testbed to investigate Internet mobility technologies. Based on testing of building, protocol implementation details and problems to deploy it will b...
Keisuke Uehara, Hideki Sunahara, Jun Murai
NDSS
2002
IEEE
15 years 7 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
DAC
1996
ACM
15 years 6 months ago
Integrating Formal Verification Methods with A Conventional Project Design Flow
We present a formal verification methodology that we have used on a computer system design project. The methodology integrates a temporal logic model checker with a conventional pr...
Ásgeir Th. Eiríksson