Sciweavers

483 search results - page 80 / 97
» Patterns of Protocols
Sort
View
ENTCS
2007
110views more  ENTCS 2007»
13 years 7 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
BC
2004
73views more  BC 2004»
13 years 7 months ago
Dynamics and stability of insect locomotion: a hexapedal model for horizontal plane motions
We develop a simple hexapedal model for the dynamics of insect locomotion in the horizontal plane. Each leg is a linear spring endowed with two inputs, controlling force-free lengt...
Justin E. Seipel, Philip J. Holmes, Robert J. Full
CCR
2004
151views more  CCR 2004»
13 years 7 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CN
2002
77views more  CN 2002»
13 years 7 months ago
MATE: multipath adaptive traffic engineering
Destination-based forwarding in traditional IP routers has not been able to take full advantage of multiple paths that frequently exist in Internet Service Provider Networks. As a...
Anwar Elwalid, Cheng Jin, Steven H. Low, Indra Wid...
CN
2002
161views more  CN 2002»
13 years 7 months ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert