Abstract. We consider monitoring and checking formally specified properties in a network. We are addressing the problem of deploying the checkers on different network nodes that ...
Embedded networks for chip-to-chip networks are emerging as communication infrastructure in mobile devices. We present three novel embedded network protocols: a sliding window prot...
Despo Galataki, Andrei Radulescu, Kees Verstoep, W...
Network-based information systems use well-defined standards to ensure interoperability and also have a tightly coupled relationship between their internal data representation an...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
In wireless networks, the channels are often subject to random variations that limit the reliability of communications between any two radios. Geographic transmission strategies ca...
Murali Rao, Tathagata D. Goswami, Joseph Glover, J...
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...