Sciweavers

7329 search results - page 88 / 1466
» Network Extractor Protocols
Sort
View
118
Voted
SIGOPSE
2004
ACM
15 years 8 months ago
The firecracker protocol
We propose the Firecracker protocol for data dissemination in wireless sensor networks. Firecracker uses a combination of routing and broadcasts to rapidly deliver a piece of data...
Philip Levis, David E. Culler
NDSS
2008
IEEE
15 years 9 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
SEUS
2009
IEEE
15 years 9 months ago
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
Hyun-Wook Jin, Junbeom Yoo
142
Voted
WIMOB
2008
IEEE
15 years 9 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
DSN
2003
IEEE
15 years 8 months ago
Cost-Optimization of the IPv4 Zeroconf Protocol
This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfig...
Henrik C. Bohnenkamp, Peter van der Stok, Holger H...