Sciweavers

177 search results - page 8 / 36
» Reasoning About Active Network Protocols
Sort
View
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 3 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
ICNP
2003
IEEE
14 years 1 months ago
Improving TCP Startup Performance Using Active Measurements: Algorithm and Evaluation
TCP Slow Start exponentially increases the congestion window size to detect the proper congestion window for a network path. This often results in significant packet loss, while ...
Ningning Hu, Peter Steenkiste
AINA
2003
IEEE
14 years 6 days ago
Formal Verification of Condition Data Flow Diagrams for Assurance of Correct Network Protocols
Condition Data Flow Diagrams (CDFDs) are a formalized notation resulting from the integration of Yourdon Data Flow Diagrams, Petri Nets, and pre-post notation. They are used in th...
Shaoying Liu
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
CCS
2008
ACM
13 years 10 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers