Sciweavers

3532 search results - page 636 / 707
» Overlay networks with class
Sort
View
LPAR
2007
Springer
15 years 6 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
WADS
2007
Springer
89views Algorithms» more  WADS 2007»
15 years 6 months ago
Dynamic TCP Acknowledgment with Sliding Window
The dynamic TCP acknowledgement problem formulated by Dooly et al. has been intensively studied in the area of competitive analysis. However, their framework does not consider the ...
Hisashi Koga
ETFA
2006
IEEE
15 years 6 months ago
Investigating Connector Faults in the Time-Triggered Architecture
In the context of distributed real-time systems as deployed in the avionic and the automotive domain a substantial number of system malfunctions result from connector faults. For ...
Philipp Peti, Roman Obermaisser, Harald Paulitsch
87
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
INFOCOM
2006
IEEE
15 years 6 months ago
Optimal Energy and Delay Tradeoffs for Multi-User Wireless Downlinks
— We consider the fundamental delay tradeoffs for minimizing energy expenditure in a multi-user wireless downlink with randomly varying channels. First, we extend the BerryGallag...
Michael J. Neely