Sciweavers

3972 search results - page 111 / 795
» Design of the iSCSI Protocol
Sort
View
LICS
2006
IEEE
14 years 4 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
PEWASUN
2006
ACM
14 years 4 months ago
Experimental analysis of a transport protocol for ad hoc networks (TPA)
Many previous papers have pointed out that TCP performance in multi-hop ad hoc networks is not optimal. This is due to several TCP design principles that reflect the characteristi...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
FOCS
2002
IEEE
14 years 3 months ago
Protocols and Impossibility Results for Gossip-Based Communication Mechanisms
In recent years, gossip-based algorithms have gained prominence as a methodology for designing robust and scalable communication schemes in large distributed systems. The premise ...
David Kempe, Jon M. Kleinberg
PERCOM
2004
ACM
14 years 10 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
ADHOC
2008
131views more  ADHOC 2008»
13 years 10 months ago
Ad hoc routing for multilevel power save protocols
Designing energy efficient protocols for ad hoc networks is important since there has been little improvement in the amount of energy stored on these devices. Previous work [1]
Matthew J. Miller, Nitin H. Vaidya