Sciweavers

3972 search results - page 176 / 795
» Design of the iSCSI Protocol
Sort
View
APPT
2009
Springer
15 years 8 months ago
Dealing with Traffic-Area Trade-Off in Direct Coherence Protocols for Many-Core CMPs
Abstract. In many-core CMP architectures, the cache coherence protocol is a key component since it can add requirements of area and power consumption to the final design and, there...
Alberto Ros, Manuel E. Acacio, José M. Garc...
EUC
2007
Springer
15 years 8 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
ATAL
2006
Springer
15 years 8 months ago
Monotonic concession protocols for multilateral negotiation
The most natural way of thinking about negotiation is probably a situation whereby each of the parties involved initially make a proposal that is particularly beneficial to themse...
Ulle Endriss
ANTSW
2008
Springer
15 years 6 months ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
ATAL
2008
Springer
15 years 6 months ago
Synchronization protocols for reliable communication in fully distributed agent systems
In order to prevent misunderstandings within groups of interacting agents, it is necessary to ensure that the agents' beliefs regarding the overall state of the interaction a...
Hywel R. Dunn-Davies, Jim Cunningham, Shamimabi Pa...