Sciweavers

986 search results - page 11 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
EUROCRYPT
2011
Springer
12 years 11 months ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh
ACMSE
2006
ACM
14 years 1 months ago
Mobility models for vehicular ad hoc network simulations
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
Niranjan Potnis, Atulya Mahajan
COMPSEC
2010
142views more  COMPSEC 2010»
13 years 4 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
DATE
2009
IEEE
126views Hardware» more  DATE 2009»
14 years 2 months ago
Fast and accurate protocol specific bus modeling using TLM 2.0
—The need to have Transaction Level models early in the design cycle is becoming more and more important to shorten the development times of complex Systems-on-Chip (SoC). These ...
H. W. M. van Moll, Henk Corporaal, Víctor R...
MSWIM
2009
ACM
14 years 8 days ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...