Sciweavers

505 search results - page 84 / 101
» Message from General Co-Chairs
Sort
View
MSWIM
2005
ACM
14 years 1 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
FASE
2005
Springer
14 years 1 months ago
Coverage Criteria for Testing of Object Interactions in Sequence Diagrams
This work defines several control-flow coverage criteria for testing the interactions among a set of collaborating objects. The criteria are based on UML sequence diagrams that a...
Atanas Rountev, Scott Kagan, Jason Sawin
MSN
2005
Springer
14 years 1 months ago
Dual Binding Update with Additional Care of Address in Network Mobility
In this paper, we propose an end-to-end route optimization scheme for nested mobile networks, which we refer to as Dual Binding Update (DBU ). In general, the nested mobile network...
Kwang Chul Jeong, Tae-Jin Lee, Hyunseung Choo
WOSP
2004
ACM
14 years 1 months ago
Software performance modelling using PEPA nets
Modelling and analysing distributed and mobile software systems is a challenging task. PEPA nets—coloured stochastic Petri nets—are a recently introduced modelling formalism w...
Stephen Gilmore, Jane Hillston, Leïla Kloul, ...
WS
2004
ACM
14 years 1 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell