Sciweavers

1498 search results - page 98 / 300
» Collection tree protocol
Sort
View
132
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
LOFT: A Latency-Oriented Fault Tolerant Transport Protocol for Wireless Sensor-Actuator Networks
— Wireless sensor-actuator networks, or WSANs, refer to a group of sensors and actuators which collect data from the environment and perform application-specific actions in resp...
Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu, Ji...
111
Voted
DAC
2003
ACM
16 years 3 months ago
Using a formal specification and a model checker to monitor and direct simulation
We describe a technique for verifying that a hardware design correctly implements a protocol-level formal specification. Simulation steps are translated to protocol state transiti...
Serdar Tasiran, Yuan Yu, Brannon Batson
118
Voted
IPPS
2009
IEEE
15 years 9 months ago
Improving RDMA-based MPI eager protocol for frequently-used buffers
MPI is the main standard for communication in high-performance clusters. MPI implementations use the Eager protocol to transfer small messages. To avoid the cost of memory registr...
Mohammad J. Rashti, Ahmad Afsahi
118
Voted
VMCAI
2005
Springer
15 years 8 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
126
Voted
JCP
2007
148views more  JCP 2007»
15 years 2 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy