Sciweavers

292 search results - page 31 / 59
» Communication and Round Efficient Information Checking Proto...
Sort
View
SECON
2008
IEEE
14 years 2 months ago
Immunity-Based Epidemic Routing in Intermittent Networks
– In this research, we propose to modify and extend epidemic routing used in intermittent networks. In particular, we propose to include immunity-based information disseminated i...
Padma Mundur, Matthew Seligman, Jin Na Lee
EMSOFT
2006
Springer
14 years 5 days ago
Analysis of the zeroconf protocol using UPPAAL
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
Biniam Gebremichael, Frits W. Vaandrager, Miaomiao...
EEE
2005
IEEE
14 years 2 months ago
A Pattern Language for Decentralized Coordination and Negotiation Protocols
Currently negotiation covers a huge and unstructured domain of negotiation- and coordination protocols and associated strategies. Researchers and practitioners like system enginee...
Adrian Paschke, Christine Kiss, Samer Al-Hunaty
ITCC
2005
IEEE
14 years 2 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
14 years 1 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan