Sciweavers

3972 search results - page 122 / 795
» Design of the iSCSI Protocol
Sort
View
ICSE
2008
IEEE-ACM
14 years 10 months ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich
AOSE
2005
Springer
14 years 3 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
VTC
2008
IEEE
135views Communications» more  VTC 2008»
14 years 4 months ago
MACA-MN: A MACA-Based MAC Protocol for Underwater Acoustic Networks with Packet Train for Multiple Neighbors
Abstract— Unlike the terrestrial wireless networks that utilize the radio channel, underwater networks use the acoustic channel, which poses research challenges in the medium acc...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
CEC
2007
IEEE
14 years 4 months ago
A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols
—Nature-inspired routing protocols are becoming an active area of research. Researchers in the community follow a wn engineering philosophy: inspire, abstract, design, develop an...
Saira Zahid, Muhammad Shahzad, Syed Usman Ali, Mud...
ESORICS
2007
Springer
14 years 4 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...