Sciweavers

986 search results - page 59 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
ICDCS
2007
IEEE
14 years 3 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ALENEX
2003
137views Algorithms» more  ALENEX 2003»
13 years 10 months ago
The Markov Chain Simulation Method for Generating Connected Power Law Random Graphs
Graph models for real-world complex networks such as the Internet, the WWW and biological networks are necessary for analytic and simulation-based studies of network protocols, al...
Christos Gkantsidis, Milena Mihail, Ellen W. Zegur...
PODC
1994
ACM
14 years 1 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca
JCM
2007
191views more  JCM 2007»
13 years 8 months ago
Performance Evaluation of IEEE 802.15.4: Experimental and Simulation Results
- Wireless Local Area Networking standard (Wi-Fi) and the WPAN standard (Bluetooth and Zigbee) products utilize the same unlicensed 2.4 GHz ISM band. Co-existence between such wire...
Khaled Shuaib, Maryam Alnuaimi, Mohammed Boulmalf,...
INFOCOM
2000
IEEE
14 years 1 months ago
Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the perf...
Samir Ranjan Das, Charles E. Perkins, Elizabeth M....