Sciweavers

1362 search results - page 131 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
137
Voted
ICNP
2005
IEEE
15 years 9 months ago
The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks
In wireless networks, it is well understood what throughput can be achieved by nodes who can hear each other (i.e. nodes within a single cell)[1, 3]. The effects of nodes beyond t...
Yan Gao, Dah-Ming Chiu, John C. S. Lui
DSN
2002
IEEE
15 years 8 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
ICNP
1999
IEEE
15 years 7 months ago
Smoothing and Prefetching Video from Distributed Servers
Video prefetching has been proposed recently for the transmission of variable-bit-rate(VBR) video over a packetswitched network. The objective of these protocols is to prefetch fu...
Spiridon Bakiras, Victor O. K. Li
127
Voted
CCS
2008
ACM
15 years 5 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
151
Voted
FORTE
2010
15 years 4 months ago
Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory
Wireless sensor networks are typically ad-hoc networks of resource-constrained nodes; in particular, the nodes are limited in power resources. It can be difficult and costly to rep...
Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, ...