Sciweavers

679 search results - page 68 / 136
» GA-Based Performance Analysis of Network Protocols
Sort
View
TCOM
2010
144views more  TCOM 2010»
14 years 10 months ago
Transmission Radius Control in Wireless Ad Hoc Networks with Smart Antennas
—In this paper, we present a model to analyze the performance of three transmission strategies with smart antennas, i.e. directional antennas with adjustable transmission power. ...
Fei Huang, Ka-Cheong Leung, Victor O. K. Li
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 7 days ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
FORTE
2011
14 years 3 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
JSAC
2010
131views more  JSAC 2010»
14 years 10 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
VTC
2008
IEEE
112views Communications» more  VTC 2008»
15 years 6 months ago
Theoretical Analysis of Saturation Throughput in MU-DCF
Abstract—In this paper, the calculation of saturation throughput for previously proposed Multi-User - Distributed Coordination Function (MU-DCF) is presented. MU-DCF is an IEEE 8...
Jelena Mirkovic, Bernhard Walke