Sciweavers

1653 search results - page 106 / 331
» Timed analysis of security protocols
Sort
View
WORDS
2005
IEEE
15 years 8 months ago
Delay Analysis for Statistical Real-Time Channels in Mobile Ad-Hoc Networks
Wireless devices that communicate using the IEEE 802.11 protocol can be used to create mobile ad-hoc networks (MANETs). Many interesting applications using MANETs are realizable i...
Min-Gu Lee, Sunggu Lee
110
Voted
TITB
2011
113views more  TITB 2011»
14 years 9 months ago
Intensive Care Window: Real-Time Monitoring and Analysis in the Intensive Care Environment
—This paper introduces a novel, open source software named Intensive Care Window, ICW. ICW enables communication with intensive care unit bedside installed medical devices over s...
Nikolas Stylianides, Marios D. Dikaiakos, K. Haral...
132
Voted
ICCCN
2008
IEEE
15 years 9 months ago
Instrumentation and Analysis of MPI Queue Times on the SeaStar High-Performance Network
—Understanding the communication behavior and network resource usage of parallel applications is critical to achieving high performance and scalability on systems with tens of th...
Ron Brightwell, Kevin T. Pedretti, Kurt B. Ferreir...
112
Voted
ITRUST
2004
Springer
15 years 8 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
141
Voted
MMNS
2001
151views Multimedia» more  MMNS 2001»
15 years 4 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin