Sciweavers

7329 search results - page 394 / 1466
» Network Extractor Protocols
Sort
View
128
Voted
SIGCOMM
1996
ACM
15 years 9 months ago
Analysis of Techniques to Improve Protocol Processing Latency
This paper describes several techniques designed to improve protocol latency, and reports on their effectiveness when measured on a modern RISC machine employing the DEC Alpha pro...
David Mosberger, Larry L. Peterson, Patrick G. Bri...
161
Voted
IPPS
1998
IEEE
15 years 8 months ago
Protocols for Non-Deterministic Communication over Synchronous Channels
In this paper, we propose several deadlock-free protocols for implementing the generalized alternative construct, where a process non-deterministically chooses between sending or ...
Erik D. Demaine
105
Voted
JDFP
2008
81views more  JDFP 2008»
15 years 5 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
167
Voted
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 5 months ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
124
Voted
CCR
2000
78views more  CCR 2000»
15 years 4 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas