Sciweavers

1080 search results - page 191 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
SIGCOMM
1996
ACM
15 years 1 months ago
Start-Time Fair Queueing: A Scheduling Algorithm for Integrated Services Packet Switching Networks
Abstract-- We present a Start-time Fair Queueing (SFQ) algorithm that is computationally efficient and achieves fairness regardless of variation in a server capacity. We analyze it...
Pawan Goyal, Harrick M. Vin, Haichen Cheng
59
Voted
DEBS
2007
ACM
15 years 1 months ago
On adding replies to publish-subscribe
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Gianpaolo Cugola, Matteo Migliavacca, Alessandro M...
ACSAC
2006
IEEE
15 years 1 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
CAV
2006
Springer
132views Hardware» more  CAV 2006»
15 years 1 months ago
Symmetry Reduction for Probabilistic Model Checking
We present an approach for applying symmetry reduction techniques to probabilistic model checking, a formal verification method for the quantitative analysis of systems with stocha...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
80
Voted
EEE
2004
IEEE
15 years 1 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar