Sciweavers

3751 search results - page 538 / 751
» Events in security protocols
Sort
View
123
Voted
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
15 years 9 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
PADS
2004
ACM
15 years 9 months ago
Conservative Synchronization of Large-Scale Network Simulations
Parallel discrete event simulation techniques have enabled the realization of large-scale models of communication networks containing millions of end hosts and routers. However, t...
Alfred Park, Richard M. Fujimoto, Kalyan S. Peruma...
ICTAC
2004
Springer
15 years 9 months ago
Inherent Causal Orderings of Partial Order Scenarios
Scenario based requirements specifications are the industry norm for defining communication protocols. Basic scenarios captured as UML sequence diagrams, Message Sequence Charts ...
Bill Mitchell
IMC
2003
ACM
15 years 9 months ago
On the correlation between route dynamics and routing loops
Routing loops are caused by inconsistencies in the routing state of the network. Although undesirable from this aspect, they can provide insight into the routing dynamics that cau...
Ashwin Sridharan, Sue B. Moon, Christophe Diot
BIRTHDAY
2003
Springer
15 years 9 months ago
Bounded Fairness
Abstract. Bounded fairness is a stronger notion than ordinary eventuality-based fairness, one that guarantees occurrence of an event within a fixed number of occurrences of anothe...
Nachum Dershowitz, D. N. Jayasimha, Seungjoon Park