Sciweavers

3972 search results - page 147 / 795
» Design of the iSCSI Protocol
Sort
View
ICECCS
2008
IEEE
203views Hardware» more  ICECCS 2008»
14 years 4 months ago
Using AADL to Model a Protocol Stack
In recent trends, the Architecture Analysis and Design Language (AADL) has received increasing attention from safety-critical software development industries. Specific about the A...
Didier Delanote, Stefan Van Baelen, Wouter Joosen,...
EUROPAR
2007
Springer
14 years 4 months ago
Starvation-Free Transactional Memory-System Protocols
Abstract. Transactional memory systems trade ease of programming with runtime performance losses in handling transactions. This paper focuses on starvation effects that show up in ...
M. M. Waliullah, Per Stenström
WOWMOM
2005
ACM
131views Multimedia» more  WOWMOM 2005»
14 years 4 months ago
Ad-Hoc Extensions to the 802.15.3 MAC Protocol
The paper describes the design and evaluation of AdHoc extensions to the IEEE 802.15.3 Medium Access Control (MAC) layer for Wireless Personal Area Networks (WPANs). The proposed ...
Samir Datta, Ivan Seskar, Mustafa Demirhan, Siun-C...
ICDCS
2003
IEEE
14 years 3 months ago
Dynamic Module Replacement in Distributed Protocols
Dynamic module replacement — the ability to hot swap a component’s implementation at runtime — is fundamental to supporting evolutionary change in long-lived and highlyavail...
Nigamanth Sridhar, Scott M. Pike, Bruce W. Weide
IWDC
2001
Springer
210views Communications» more  IWDC 2001»
14 years 2 months ago
Access Control Protocols for Interconnected WDM Rings in the DAVID Metro Network
DAVID (Data And Voice Integration over D-WDM) is a research project sponsored by the European Community aimed at the design of an optical packet-switched network for the transport ...
Andrea Bianco, Giulio Galante, Emilio Leonardi, Fa...