Sciweavers

7329 search results - page 398 / 1466
» Network Extractor Protocols
Sort
View
PDPTA
2003
15 years 6 months ago
Analysis and Enhancement of Pipelining the Protocol Overheads for a High Throughput
This paper investigates the protocol overhead pipelining between the host and network interface card (NIC). Existing researches into the protocol overhead pipelining assume that p...
Hyun-Wook Jin, Chuck Yoo
132
Voted
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 6 months ago
Playing With Population Protocols
Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous ...
Olivier Bournez, Jérémie Chalopin, J...
ORL
2010
85views more  ORL 2010»
15 years 3 months ago
Stable routing under the Spanning Tree Protocol
The Spanning Tree Protocol routes traffic on shortest path trees. If some edges fail, the traffic has to be rerouted consequently, setting up alternative trees. In this paper we d...
Fabrizio Grandoni, Gaia Nicosia, Gianpaolo Oriolo,...
CSIE
2009
IEEE
15 years 11 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
150
Voted
CCS
2005
ACM
15 years 10 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet