Sciweavers

7329 search results - page 253 / 1466
» Network Extractor Protocols
Sort
View
FUIN
2006
142views more  FUIN 2006»
15 years 4 months ago
Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol
Abstract. We analyse different versions of the Dining Cryptographers protocol by means of automatic verification via model checking. Specifically we model the protocol in terms of ...
Magdalena Kacprzak, Alessio Lomuscio, Artur Niewia...
ENTCS
2000
63views more  ENTCS 2000»
15 years 3 months ago
The Leader Election Protocol of IEEE 1394 in Maude
In this paper we consider two descriptions in Maude of the leader election protocol from the IEEE 1394 serial multimedia bus. Particularly, the time aspects of the protocol are st...
Alberto Verdejo, Isabel Pita, Narciso Martí...
SIGCOMM
2012
ACM
13 years 6 months ago
Fs-PGBR: a scalable and delay sensitive cloud routing protocol
This paper proposes an improved version of a fully distributed routing protocol, that is applicable for cloud computing infrastructure. Simulation results shows the protocol is id...
Julien Mineraud, Sasitharan Balasubramaniam, Jussi...
MDM
2007
Springer
119views Communications» more  MDM 2007»
15 years 10 months ago
A Failure Tolerating Atomic Commit Protocol for Mobile Environments
In traditional fixed-wired networks, standard protocols like 2-Phase-Commit are used to guarantee atomicity for distributed transactions. However, within mobile networks, a highe...
Stefan Böttcher, Le Gruenwald, Sebastian Ober...
156
Voted
ESAS
2005
Springer
15 years 9 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...