Sciweavers

3972 search results - page 63 / 795
» Design of the iSCSI Protocol
Sort
View
IFIP
2009
Springer
13 years 6 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
HOST
2009
IEEE
14 years 3 months ago
Analysis and Design of Active IC Metering Schemes
—Outsourcing the fabrication of semiconductor devices to merchant foundries raises some issues concerning the IP protection of the design. Active hardware metering schemes try to...
Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Ve...
DCOSS
2011
Springer
12 years 8 months ago
Transmission Control Policy design for decentralized detection in sensor networks
—A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled...
Ashraf Tantawy, Xenofon D. Koutsoukos, Gautam Bisw...
AI
2004
Springer
14 years 2 months ago
A Principled Modular Approach to Construct Flexible Conversation Protocols
Building conversation protocols has traditionally been an art more than a science, as their construction is often guided by designers’ intuition rather than by a principled appro...
Roberto A. Flores, Robert C. Kremer
LCN
2003
IEEE
14 years 2 months ago
Development of QoS Signaling Protocols in the Internet
— QoS signaling protocol is one of the key components in Internet QoS architectures to establish, maintain, and remove reservation states in network nodes. This paper gives an ov...
Xiaoming Fu