Sciweavers

981 search results - page 77 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
VTC
2006
IEEE
15 years 5 months ago
Channel Access Priority for Vehicle Intersection Collision Warning
— We propose an Intersection Warning Channel Access Priority (IWCAP) protocol to warn drivers of a possible collision when approaching an intersection. Our protocol operates via ...
Nader M. Rabadi, Syed Masud Mahmud
SIMUTOOLS
2008
15 years 19 days ago
An accurate and extensible mobile IPv6 (xMIPV6) simulation model for OMNeT++
MIPv6 is the IPv6 based mobility management protocol and it is expected to become the mobility management protocol of choice for the Next Generation Wireless Access Networks. In o...
Faqir Zarrar Yousaf, Christian Bauer, Christian Wi...
TPDS
2008
76views more  TPDS 2008»
14 years 11 months ago
How to Choose a Timing Model
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer
LICS
1999
IEEE
15 years 3 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
CCR
2004
110views more  CCR 2004»
14 years 11 months ago
Analysis of long duration traces
This paper introduces a new set of long duration captures of Internet traffic headers. The capture is being performed on a continuous on-going basis and is approaching a year in d...
Richard Nelson, Daniel Lawson, Perry Lorier