Sciweavers

1123 search results - page 46 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
AINA
2009
IEEE
15 years 6 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
MEMOCODE
2007
IEEE
15 years 6 months ago
From WiFi to WiMAX: Techniques for High-Level IP Reuse across Different OFDM Protocols
Orthogonal Frequency-Division Multiplexing (OFDM) has become the preferred modulation scheme for both broadband and high bitrate digital wireless protocols because of its spectral...
Man Cheuk Ng, Muralidaran Vijayaraghavan, Nirav Da...
ADHOCNOW
2005
Springer
15 years 5 months ago
MIMOMAN: A MIMO MAC Protocol for Ad Hoc Networks
Multiple-Input Multiple-Output (MIMO) antenna systems present a radical way to improve the performance of wireless communications. Such systems can be utilized in wireless ad hoc n...
Joon-Sang Park, Mario Gerla
CCIA
2009
Springer
15 years 28 days ago
2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario
Abstract. In this paper, we review our Multi-Agent System (MAS) architecture (2LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS...
Jordi Campos Miralles, Maite López-Sá...
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella