Sciweavers

1777 search results - page 198 / 356
» Programming Cryptographic Protocols
Sort
View
KBSE
2008
IEEE
14 years 4 months ago
Predictive Typestate Checking of Multithreaded Java Programs
—Writing correct multithreaded programs is difficult. Existing tools for finding bugs in multithreaded programs primarily focus on finding generic concurrency problems such as...
Pallavi Joshi, Koushik Sen
ASPLOS
1994
ACM
14 years 2 months ago
Software Overhead in Messaging Layers: Where Does the Time Go?
Despite improvements in network interfaces and software messaging layers, software communication overhead still dominates the hardware routing cost in most systems. In this study,...
Vijay Karamcheti, Andrew A. Chien
ENTCS
2006
120views more  ENTCS 2006»
13 years 10 months ago
Flexible Communication of Agents based on FIPA-ACL
Communication in multi-agent systems is an important subject of the current research. In this paper, the syntax and semantics of a multi-agent programming language, called ECCS, a...
M. Jamshid Bagherzadeh, S. Arun-Kumar
ICC
2007
IEEE
168views Communications» more  ICC 2007»
14 years 4 months ago
Energy and QoS Aware Packet Forwarding in Wireless Sensor Networks
— We consider energy efficient packet forwarding with quality-of-service (QoS) guarantee for wireless sensor networks (WSNs). In most existing wireless network protocols, route ...
Rong Yu, Yan Zhang, Zhi Sun, Shunliang Mei
CNSR
2006
IEEE
136views Communications» more  CNSR 2006»
14 years 4 months ago
Combining Petri Nets and ns-2: A Hybrid Method for Analysis and Simulation
Network protocol performance and evaluation study is often carried out using a couple of widely used simulation toolkits, such as ns-2 and OPNET. These toolkits usually contain ma...
Qiang Ye, Mike H. MacGregor