Sciweavers

3972 search results - page 16 / 795
» Design of the iSCSI Protocol
Sort
View
EJWCN
2010
119views more  EJWCN 2010»
13 years 2 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...
JCS
2011
91views more  JCS 2011»
13 years 2 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
CLIMA
2011
12 years 7 months ago
Verifying Team Formation Protocols with Probabilistic Model Checking
Multi-agent systems are an increasingly important software paradigm and in many of its applications agents cooperate to achieve a particular goal. This requires the design of effi...
Taolue Chen, Marta Z. Kwiatkowska, David Parker, A...
TWC
2010
13 years 2 months ago
A Multimedia Cross-Layer Protocol for Underwater Acoustic Sensor Networks
Underwater multimedia acoustic sensor networks will enable new underwater applications such as multimedia coastal and tactical surveillance, undersea explorations, picture and vide...
Dario Pompili, Ian F. Akyildiz
JCIT
2010
151views more  JCIT 2010»
13 years 2 months ago
A Flexible Resource Location Protocol for Peer-to-Peer Network
An important and fundamental issue in designing structured peer-to-peer networks is the tradeoff between the number of logical links and the number of hops. We present a flexible ...
Xu Xiang