Sciweavers

4305 search results - page 61 / 861
» Analysing Protocol Implementations
Sort
View
IJHPCN
2006
151views more  IJHPCN 2006»
13 years 8 months ago
Adaptive local searching and caching strategies for on-demand routing protocols in ad hoc networks
: On-demand routing protocols are widely used in mobile ad hoc networks due to their capability of adjusting to frequent network topology changes within acceptable routing overhead...
Zhao Cheng, Wendi B. Heinzelman
ENTCS
2007
85views more  ENTCS 2007»
13 years 8 months ago
Stochastic Modelling of Communication Protocols from Source Code
A major development in qualitative model checking was the jump to verifying properties of source code directly, rather than requiring a separately specified model. We describe an...
Michael J. A. Smith
ESORICS
2012
Springer
11 years 11 months ago
Formal Analysis of Privacy in an eHealth Protocol
Given the sensitive nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or c...
Naipeng Dong, Hugo Jonker, Jun Pang
RTSS
2003
IEEE
14 years 2 months ago
A Consensus Protocol for CAN-Based Systems
Consensus is known to be a fundamental problem in fault-tolerant distributed systems. Solving this problem provides the means for distributed processes to agree on a single value....
George M. de A. Lima, Alan Burns
ETRA
2000
ACM
199views Biometrics» more  ETRA 2000»
14 years 14 days ago
Identifying fixations and saccades in eye-tracking protocols
The process of fixation identification--separating and labeling fixations and saccades in eye-tracking protocols--is an essential part of eye-movement data analysis and can have a...
Dario D. Salvucci, Joseph H. Goldberg