Sciweavers

4305 search results - page 575 / 861
» Analysing Protocol Implementations
Sort
View
NDSS
2009
IEEE
15 years 11 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
INFOCOM
2009
IEEE
15 years 11 months ago
C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor Networks
— This paper presents C-MAC, a new MAC protocol designed to achieve high-throughput bulk communication for dataintensive sensing applications. C-MAC exploits concurrent wireless ...
Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xi...
MOBILWARE
2009
ACM
15 years 11 months ago
Chapar: A Cross-Layer Overlay Event System for MANETs
Abstract. In this paper, we present Chapar, an event system designed for mobile ad hoc networks that supports the publish-subscribe model as well as pointto-point and point-to-mult...
Amir R. Khakpour, Isabelle M. Demeure
ANSS
2008
IEEE
15 years 11 months ago
A Primer for Real-Time Simulation of Large-Scale Networks
—Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network...
Jason Liu
FCCM
2008
IEEE
153views VLSI» more  FCCM 2008»
15 years 11 months ago
A SRAM-based Architecture for Trie-based IP Lookup Using FPGA
Internet Protocol (IP) lookup in routers can be implemented by some form of tree traversal. Pipelining can dramatically improve the search throughput. However, it results in unbal...
Hoang Le, Weirong Jiang, Viktor K. Prasanna