Sciweavers

3972 search results - page 155 / 795
» Design of the iSCSI Protocol
Sort
View
AINA
2009
IEEE
13 years 8 months ago
A CDMA-Based MAC Protocol in Tree-Topology for Underwater Acoustic Sensor Networks
In this paper, a CDMA-based medium access control (MAC) scheme in underwater acoustic sensor networks is proposed, in which a periodic sleeping mode is jointly employed for the pu...
Jong-Pil Kim, Jae-Won Lee, Youn-Seon Jang, Kweon S...
RTCSA
2007
IEEE
14 years 4 months ago
A Flexible Real-Time Locking Protocol for Multiprocessors
Real-time scheduling algorithms for multiprocessor systems have been the subject of considerable recent interest. For such an algorithm to be truly useful in practice, support for...
Aaron Block, Hennadiy Leontyev, Björn B. Bran...
FMICS
2007
Springer
14 years 4 months ago
Machine Checked Formal Proof of a Scheduling Protocol for Smartcard Personalization
Using PVS (Prototype Verification System), we prove that an industry designed scheduler for a smartcard personalization machine is safe and optimal. This scheduler has previously ...
Leonard Lensink, Sjaak Smetsers, Marko C. J. D. va...
STOC
1998
ACM
96views Algorithms» more  STOC 1998»
14 years 2 months ago
Randomized Protocols for Low Congestion Circuit Routing in Multistage Interconnection Networks
In this paper we study randomized algorithms for circuit switching on multistage networks related to the butterfly. We devise algorithms that route messages by constructing circu...
Richard Cole, Bruce M. Maggs, Friedhelm Meyer auf ...
SIGSOFT
2007
ACM
14 years 11 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna