Sciweavers

981 search results - page 78 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
CONCUR
2008
Springer
15 years 1 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
INFOCOM
2010
IEEE
14 years 9 months ago
ACR: Active Collision Recovery in Dense Wireless Sensor Networks
Abstract—Packet collision causes packet loss and wastes resources in wireless networks. It becomes even worse in dense WSNs, due to burst-traffic and congestion around sinks. In...
Yafeng Wu, Gang Zhou, John A. Stankovic
SAS
1999
Springer
124views Formal Methods» more  SAS 1999»
15 years 3 months ago
State Space Reduction Based on Live Variables Analysis
The intrinsic complexity of most protocol speci cations in particular, and of asynchronous systems in general, lead us to study combinations of static analysis with classical model...
Marius Bozga, Jean-Claude Fernandez, Lucian Ghirvu
CCGRID
2010
IEEE
15 years 9 days ago
High Performance Data Transfer in Grid Environment Using GridFTP over InfiniBand
GridFTP, designed by using the Globus XIO framework, is one of the most popular methods for performing data transfers in the Grid environment. But the performance of GridFTP in WA...
Hari Subramoni, Ping Lai, Rajkumar Kettimuthu, Dha...
MSWIM
2009
ACM
15 years 6 months ago
A performance evaluation framework for fair solutions in ad hoc networks
Fairness in multihop ad hoc networks has received considerable attention in the literature. Many schemes have been proposed, which attempt to compute the “optimal” bit rates o...
Manos Dramitinos, Rémi Vannier, Isabelle Gu...