Sciweavers

1362 search results - page 135 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
INFOCOM
2007
IEEE
15 years 9 months ago
Gossiping with Multiple Messages
Abstract— This paper investigates the dissemination of multiple pieces of information in large networks where users contact each other in a random uncoordinated manner, and users...
Sujay Sanghavi, Bruce Hajek, Laurent Massouli&eacu...
142
Voted
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 9 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
136
Voted
WCNC
2008
IEEE
15 years 9 months ago
Physical Carrier Sensing Outage in Single Hop IEEE 802.11 Ad Hoc Networks with Slowly Moving Stations
—Physical Carrier Sensing plays a crucial role in the effectiveness of CSMA-based MAC protocols, yet its properties and impact on the system performance under slow fading channel...
Jin Sheng, Kenneth S. Vastola
INFOCOM
2006
IEEE
15 years 9 months ago
Analyzing the Energy-Latency Trade-Off During the Deployment of Sensor Networks
— The inherent trade-off between energy-efficiency and rapidity of event dissemination is characteristic for wireless sensor networks. Scarcity of energy renders it necessary fo...
Thomas Moscibroda, Pascal von Rickenbach, Roger Wa...
121
Voted
CASCON
1996
113views Education» more  CASCON 1996»
15 years 4 months ago
Network management views using delegated agents
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
Germán S. Goldszmidt