Sciweavers

2162 search results - page 341 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
15 years 10 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima
PERCOM
2008
ACM
15 years 9 months ago
Cardinality Estimation for Large-scale RFID Systems
Counting or estimating the number of tags is crucial for large-scale RFID systems. The use of multiple readers was recently proposed to improve the efficiency and effectiveness in ...
Chen Qian, Hoilun Ngan, Yunhao Liu
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
OTM
2009
Springer
15 years 4 months ago
Parallel Interconnection of Broadcast Systems with Multiple FIFO Channels
This paper proposes new protocols for the interconnection of FIFO- and causal-ordered broadcast systems, thus increasing their scalability. They use several interconnection links b...
Rubén de Juan-Marín, Vicent Cholvi, ...
DSD
2008
IEEE
136views Hardware» more  DSD 2008»
15 years 4 months ago
Flexible Baseband Architectures for Future Wireless Systems
— The mobile communication systems today, have different radio spectrum, radio access technologies, and protocol stacks depending on the network being utilized. This gives rise t...
Najam-ul-Islam Muhammad, Rizwan Rasheed, Renaud Pa...