Sciweavers

925 search results - page 40 / 185
» Typing Component-Based Communication Systems
Sort
View
TYPES
1993
Springer
14 years 2 months ago
Proof-Checking a Data Link Protocol
Abstract. A data link protocol developed and used by Philips Electronics is modeled and veri ed using I/O automata theory. Correctness is computer-checked with the Coq proof develo...
Leen Helmink, M. P. A. Sellink, Frits W. Vaandrage...
INFOCOM
2008
IEEE
14 years 4 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
INFOCOM
2010
IEEE
13 years 8 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
CDC
2010
IEEE
148views Control Systems» more  CDC 2010»
13 years 4 months ago
Convergence rates of consensus algorithms in stochastic networks
Abstract-- We study the convergence rate of average consensus algorithms in networks with stochastic communication failures. We show how the system dynamics can be modeled by a dis...
Stacy Patterson, Bassam Bamieh
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 4 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang