Sciweavers

648 search results - page 79 / 130
» The GCHQ Protocol and Its Problems
Sort
View
MOBISYS
2005
ACM
14 years 8 months ago
An overlay MAC layer for 802.11 networks
The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. Ho...
Ananth Rao, Ion Stoica
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 3 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis
GLOBECOM
2007
IEEE
14 years 3 months ago
Multiconstrained QoS Routing: Greedy is Good
— A fundamental problem in quality-of-service (QoS) routing is to find a path connecting a source node to a destination node that satisfies K ≥ 2 additive QoS constraints. Th...
Guoliang Xue, Weiyi Zhang
ICCSA
2007
Springer
14 years 2 months ago
Route Optimization with Additional Destination-Information in Mobile Networks
Abstract. In nested mobile networks with NEMO basic support protocol [3], the pinball routing problem occurs because since it is based on bi-directional tunneling between the mobil...
Jeonghoon Park, Sangho Lee, Youho Lee, Hyunseung C...
TACAS
2007
Springer
144views Algorithms» more  TACAS 2007»
14 years 2 months ago
Detecting Races in Ensembles of Message Sequence Charts
Abstract. The analysis of message sequence charts (MSCs) is highly important in preventing common problems in communication protocols. Detecting race conditions, i.e., possible dis...
Edith Elkind, Blaise Genest, Doron Peled