Sciweavers

4305 search results - page 786 / 861
» Analysing Protocol Implementations
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
HaND: Fast Handoff with Null Dwell Time for IEEE 802.11 Networks
How to reduce the handoff delay and how to make appropriate handoff decisions are two fundamental challenges in designing an effective handoff scheme for 802.11 networks to provide...
Xi Chen, Daji Qiao
IPPS
2010
IEEE
13 years 8 months ago
Consistency in hindsight: A fully decentralized STM algorithm
Abstract--Software transactional memory (STM) algorithms often rely on centralized components to achieve atomicity, isolation and consistency. In a distributed setting, centralized...
Annette Bieniusa, Thomas Fuhrmann
SENSYS
2010
ACM
13 years 8 months ago
Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless
We present A-MAC, a receiver-initiated link layer for low-power wireless networks that supports several services under a unified architecture, and does so more efficiently and sca...
Prabal Dutta, Stephen Dawson-Haggerty, Yin Chen, C...
SENSYS
2010
ACM
13 years 8 months ago
sMAP: a simple measurement and actuation profile for physical information
As more and more physical information becomes available, a critical problem is enabling the simple and efficient exchange of this data. We present our design for a simple RESTful ...
Stephen Dawson-Haggerty, Xiaofan Jiang, Gilman Tol...
SICHERHEIT
2010
13 years 8 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...