Sciweavers

3972 search results - page 153 / 795
» Design of the iSCSI Protocol
Sort
View
WISE
2005
Springer
14 years 4 months ago
Asynchronous Web Services Communication Patterns in Business Protocols
Asynchronous interactions are becoming more and more important in the realization of complex B2B Web applications, and Web services are at the moment the most innovative and well-e...
Marco Brambilla, Giuseppe Guglielmetti, Christina ...
FOSSACS
2004
Springer
14 years 3 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
ISAS
2004
Springer
14 years 3 months ago
A Measurement Study of the Interplay Between Application Level Restart and Transport Protocol
Restart is an application-level mechanism to speed up the completion of tasks that are subject to failures or unpredictable delays. In this paper we investigate if restart can be b...
Philipp Reinecke, Aad P. A. van Moorsel, Katinka W...
LCN
1999
IEEE
14 years 2 months ago
An Intelligent Hub Protocol for Local Area Lightwave Networks
This paper presents a protocol for packet switched optical LANs using a star topology. The key element in this network is the use of an intelligent hub, which controls the traffic...
Dale Callahan, Gary J. Grimes
AINA
2006
IEEE
14 years 2 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...