Sciweavers

7329 search results - page 311 / 1466
» Network Extractor Protocols
Sort
View
ICNP
2007
IEEE
15 years 10 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
15 years 10 months ago
Verifying Distributed Protocols using MSC-Assertions, Run-time Monitoring, and Automatic Test Generation
This paper addresses the need for formal specification and runtime verification of system-level requirements of distributed reactive systems. It describes a formalism for specifyi...
Doron Drusinsky, Man-tak Shing
ICPADS
2002
IEEE
15 years 9 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
DIALM
1999
ACM
127views Algorithms» more  DIALM 1999»
15 years 8 months ago
The performance of query control schemes for the zone routing protocol
—In this paper, we study the performance of route query control mechanisms for the Zone Routing Protocol (ZRP) for ad hoc networks. ZRP proactively maintains routing information ...
Zygmunt J. Haas, Marc R. Pearlman
INFOCOM
1999
IEEE
15 years 8 months ago
Scalability Evaluation of Multi-Protocol Over ATM (MPOA)
Multi-Protocol over ATM (MPOA) is being considered by the industry as an important short-cut technology that provides an efficient transfer of inter-subnet unicast data in a LANE ...
Indra Widjaja, Haining Wang, Steven Wright, Amalen...