Sciweavers

2162 search results - page 294 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
SIMUTOOLS
2008
14 years 11 months ago
Simulating wireless and mobile networks in OMNeT++ the MiXiM vision
Wireless communication has attracted considerable interest in the research community, and many wireless networks are evaluated using discrete event simulators like OMNeT++. Althou...
A. Köpke, M. Swigulski, K. Wessel, D. Willkom...
CNIS
2006
14 years 11 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
ICMAS
2000
14 years 11 months ago
Reasoning About Others: Representing and Processing Infinite Belief Hierarchies
In this paper we focus on the problem of how infinite belief hierarchies can be represented and reasoned with in a computationally tractable way. When modeling nested beliefs one ...
Sviatoslav Brainov, Tuomas Sandholm
IWFM
2000
107views Formal Methods» more  IWFM 2000»
14 years 11 months ago
A Comparison of Three Model Checkers Applied to a Distributed Database Problem
ct Increasingly, model checking is being applied to more abstract problem domains than the traditional protocol analysis. The extent to which such an approach is able to provide us...
A. J. Currie
GLOBECOM
2008
IEEE
14 years 11 months ago
Outage Behavior of Cooperative Diversity with Relay Selection
Abstract—Cooperative diversity is a useful technique to increase reliability and throughput of wireless networks. To analyze the performance gain from cooperative diversity, outa...
Kampol Woradit, Tony Q. S. Quek, Watcharapan Suwan...