Sciweavers

1665 search results - page 147 / 333
» On Quiescent Reliable Communication
Sort
View
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 5 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
JSAC
2011
137views more  JSAC 2011»
13 years 1 months ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...
VEE
2012
ACM
214views Virtualization» more  VEE 2012»
12 years 5 months ago
CompSC: live migration with pass-through devices
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current...
Zhenhao Pan, Yaozu Dong, Yu Chen, Lei Zhang, Zhiji...
ICITS
2011
13 years 1 months ago
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families
In this paper, we use the concept of colored edge graphs to model homogeneous faults in networks. We then use this model to study the minimum connectivity (and design) requirements...
Yongge Wang, Yvo Desmedt
INFOCOM
2009
IEEE
14 years 4 months ago
Interference-Resilient Information Exchange
—This paper presents an efficient protocol to reliably exchange information in a single-hop radio network with unpredictable interference. The devices can access C communication...
Seth Gilbert, Rachid Guerraoui, Dariusz R. Kowalsk...