Sciweavers

328 search results - page 27 / 66
» On the Enactability of Business Protocols
Sort
View
FASE
2004
Springer
14 years 3 months ago
Compositional Nested Long Running Transactions
Abstract. Web Services offer a widespread standard for making services available on the Internet. Of particular interest is the possibility of composing existing distributed servi...
Laura Bocchi
ICC
1997
IEEE
159views Communications» more  ICC 1997»
14 years 2 months ago
Collision Avoidance and Resolution Multiple Access: First-Success Protocols
Abstract—Collision avoidance and resolution multiple access (CARMA) protocols establish a three-way handshake between sender and receiver to attempt to avoid collisions, and reso...
Rodrigo Garcés, J. J. Garcia-Luna-Aceves
INFOCOM
2008
IEEE
14 years 4 months ago
A Backup Route Aware Routing Protocol - Fast Recovery from Transient Routing Failures
Abstract— As the Internet becomes the critical information infrastructure for both personal and business applications, survivable routing protocols need to be designed that maint...
Feng Wang, Lixin Gao
COMSIS
2006
100views more  COMSIS 2006»
13 years 10 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain