Sciweavers

22 search results - page 3 / 5
» Using ProVerif to Analyze Protocols with Diffie-Hellman Expo...
Sort
View
BROADNETS
2007
IEEE
14 years 2 months ago
Scheduling routing table calculations to achieve fast convergence in OSPF protocol
Fast convergence to topology changes is a key requirement in modern routing infrastructure while reducing the protocol CPU overhead continues to be as important as before. In this...
Mukul Goyal, Weigao Xie, Mohd Soperi, Seyed H. Hos...
INFOCOM
2006
IEEE
14 years 2 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
JFP
2006
113views more  JFP 2006»
13 years 8 months ago
Efficient manipulation of binary data using pattern matching
Pattern matching is an important operation in functional programs. So far, pattern matching has been investigated in the context of structured terms. This article presents an appr...
Per Gustafsson, Konstantinos F. Sagonas
ATAL
2004
Springer
14 years 1 months ago
On Safe Kernel Stable Coalition Forming among Agents
We investigate and discuss safety and privacy preserving properties of a game-theortic based coalition algorithm KCA for forming kernel stable coalitions among information agents ...
Bastian Blankenburg, Matthias Klusch
GLOBECOM
2010
IEEE
13 years 6 months ago
Analysis of Messaging Load in a P2PP Overlay Network under Churn
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Otso Kassinen, Erkki Harjula, Mika Ylianttila