Sciweavers

1362 search results - page 84 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
PERCOM
2006
ACM
16 years 3 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
SPIN
2010
Springer
15 years 2 months ago
Combining SPIN with ns-2 for Protocol Optimization
In the field of communication networks, protocol engineers usually employ several tools focused on specific kinds of analysis, such as performance or correctness. This paper pres...
Pedro Merino, Alberto Salmeron
ICSOC
2010
Springer
15 years 2 months ago
Service Discovery Using Communication Fingerprints
A request to a service registry must be answered with a service that fits in several regards, including semantic compatibility, non-functional compatibility, and interface compati...
Olivia Oanea, Jan Sürmeli, Karsten Wolf
ICPADS
2005
IEEE
15 years 9 months ago
A Hint-Based Probabilistic Protocol for Unicast Communications in MANETs
Point-to-point transmissions represent a fundamental primitive in any communication network. Despite many proave appeared in the literature, providing an efficient implementation ...
Roberto Beraldi, Leonardo Querzoni, Roberto Baldon...
115
Voted
ICRA
2008
IEEE
147views Robotics» more  ICRA 2008»
15 years 10 months ago
Automatic deployment and formation control of decentralized multi-agent networks
— Novel tools are needed to deploy multi-agent networks in applications that require a high degree of accuracy in the achievement and maintenance of geometric formations. This is...
Brian Stephen Smith, Magnus Egerstedt, Ayanna M. H...