Sciweavers

55 search results - page 3 / 11
» Simulation-based verification of network protocols performan...
Sort
View
WWW
2007
ACM
14 years 8 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
ICC
2008
IEEE
139views Communications» more  ICC 2008»
14 years 1 months ago
Evaluation of RSVP and Mobility-Aware RSVP Using Performance Evaluation Process Algebra
—As a resource reservation mechanism, the Resource ReSerVation Protocol (RSVP) faces a lot of challenges when applying it to the wireless and mobile networks. The interworking pr...
Hao Wang, David I. Laurenson, Jane Hillston
IJSNET
2011
55views more  IJSNET 2011»
12 years 11 months ago
Testing network protocols and signal attenuation in packed food transports
: Two sensor network protocols for the monitoring of packed food products were tested in different sea containers. The packet rate and the signal strength of all sensor-to-sensor l...
Reiner Jedermann, Markus Becker, Carmelita Gö...
NSDI
2004
13 years 8 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
MOBIHOC
2003
ACM
14 years 7 months ago
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks
Directional antennas in ad hoc networks offer many benefits compared with classical omnidirectional antennas. The most important include significant increase of spatial reuse, cov...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...