Sciweavers

4305 search results - page 51 / 861
» Analysing Protocol Implementations
Sort
View
DELTA
2008
IEEE
14 years 3 months ago
FPGA implementation of a Single Pass Connected Components Algorithm
The classic connected components labelling algorithm requires two passes through an image. This paper presents an algorithm that allows the connected components to be analysed in ...
Christopher T. Johnston, Donald G. Bailey
SSS
2009
Springer
138views Control Systems» more  SSS 2009»
14 years 3 months ago
Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios
We describe an approach to the analysis of protocols for wireless sensor networks in scenarios with mobile nodes and dynamic link quality. The approach is based on the theorem prov...
Cinzia Bernardeschi, Paolo Masci, Holger Pfeifer
DAGSTUHL
2003
13 years 10 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw
IFIP
2009
Springer
13 years 6 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
ISPDC
2005
IEEE
14 years 2 months ago
On the Implementation and Evaluation of Berkeley Sockets on Maestro2 cluster computing environment
The support on cluster environments of ”legacy protocols” is important to avoid rewriting the code of applications, but this support should not prevent to achieve the maximum ...
Ricardo Guapo, Leonel Sousa, Shinichi Yamagiwa