Sciweavers

1875 search results - page 35 / 375
» Automatic Network Protocol Analysis
Sort
View
CCR
1998
75views more  CCR 1998»
13 years 9 months ago
A comparative analysis of groupware application protocols
Two of the most difficult problems faced by developers of synchronous groupware applications are the handling of multiple session connections and the maintenance of replicated dat...
Mark Pendergast
ACISP
2005
Springer
14 years 3 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
WMASH
2004
ACM
14 years 3 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
CN
2007
112views more  CN 2007»
13 years 10 months ago
Capacity analysis and MAC enhancement for UWB broadband wireless access networks
We analyze the capacity of ultra-wide band (UWB) wireless access networks supporting multimedia services by calculating the number of multimedia connections that can be supported ...
Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai
ICRA
2008
IEEE
147views Robotics» more  ICRA 2008»
14 years 4 months ago
Automatic deployment and formation control of decentralized multi-agent networks
— Novel tools are needed to deploy multi-agent networks in applications that require a high degree of accuracy in the achievement and maintenance of geometric formations. This is...
Brian Stephen Smith, Magnus Egerstedt, Ayanna M. H...