Sciweavers

648 search results - page 30 / 130
» The GCHQ Protocol and Its Problems
Sort
View
RTAS
1998
IEEE
14 years 27 days ago
Verification of the Fast Reservation Protocol with Delayed Transmission using the Tool Kronos
In this paper we report the work carried out at VERIMAG 1 within the framework of an research cooperation with CNET 2 . The goal of this work was twofold: to formally specify the ...
Stavros Tripakis, Sergio Yovine
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 3 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...
ETFA
2005
IEEE
14 years 2 months ago
ZRP versus DSR and TORA: a comprehensive survey on ZRP performance
Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non-deterministic behavior (interference, multipath, hidd...
Spilios Giannoulis, Christos D. Antonopoulos, Evan...
FPT
2005
IEEE
163views Hardware» more  FPT 2005»
14 years 2 months ago
Designing an FPGA SoC Using a Standardized IP Block Interface
Designing Systems on-Chip is becoming increasingly popular as die sizes increase and technology sizes decrease. The complexity of integrating different types of Processing Element...
Lesley Shannon, Blair Fort, Samir Parikh, Arun Pat...
ATAL
1999
Springer
14 years 28 days ago
A Scalable Agent Location Mechanism
Large scale open multi-agent systems where agents need services of other agents but may not know their contact information require agent location mechanisms. Solutions to this pro...
Onn Shehory