Sciweavers

3972 search results - page 20 / 795
» Design of the iSCSI Protocol
Sort
View
ICICS
2005
Springer
14 years 1 months ago
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerably simpler and more efficient than current proposals, due mainly to the avoidanc...
J. G. Cederquist, Ricardo Corin, Muhammad Torabi D...
GLOBECOM
2010
IEEE
13 years 5 months ago
ATMA: Advertisement-Based TDMA Protocol for Bursty Traffic in Wireless Sensor Networks
Energy conservation is one of the primary goals of the majority of MAC protocols designed for wireless sensor networks. In Sensor-MAC (S-MAC), one of the first MAC protocols design...
Surjya Sarathi Ray, Ilker Demirkol, Wendi Rabiner ...
ENTCS
2008
390views more  ENTCS 2008»
13 years 6 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
TPDS
2008
134views more  TPDS 2008»
13 years 7 months ago
Extending the TokenCMP Cache Coherence Protocol for Low Overhead Fault Tolerance in CMP Architectures
It is widely accepted that transient failures will appear more frequently in chips designed in the near future due to several factors such as the increased integration scale. On th...
Ricardo Fernández Pascual, José M. G...
DPD
2002
97views more  DPD 2002»
13 years 7 months ago
Dictatorial Transaction Processing: Atomic Commitment Without Veto Right
The current standard in governing distributed transaction termination is the so-called Two-Phase Commit protocol (2PC). The first phase of 2PC is a voting phase, where the partici...
Maha Abdallah, Rachid Guerraoui, Philippe Pucheral