Sciweavers

1362 search results - page 107 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
131
Voted
IFIP
2003
Springer
15 years 9 months ago
A Service Discovery Model for Wireless and Mobile Terminals in IPv6
As the mobility and the number of affordable, powerful, and highly portable devices becoming networked increases, so will the amount of networked services offered, managed and disc...
Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harj...
141
Voted
CSFW
2009
IEEE
15 years 7 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
123
Voted
DC
2002
15 years 3 months ago
Causality tracking in causal message-logging protocols
Abstract. Casual message-logging protocols have several attractive properties: they introduce no blocking, send no additional messages over those sent by the application, and never...
Lorenzo Alvisi, Karan Bhatia, Keith Marzullo
119
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor Networks
— This paper presents C-MAC, a new MAC protocol designed to achieve high-throughput bulk communication for dataintensive sensing applications. C-MAC exploits concurrent wireless ...
Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xi...
95
Voted
ISCC
2007
IEEE
15 years 10 months ago
On XCP Stability in a Heterogeneous Network
In this paper, we analyze stability of XCP (eXplicit Control Protocol) in a network with heterogeneous XCP flows (i.e., XCP flows with different propagation delays). Specificall...
Yusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase