Sciweavers

1080 search results - page 32 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
IAJIT
2010
87views more  IAJIT 2010»
14 years 10 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
FM
2005
Springer
125views Formal Methods» more  FM 2005»
15 years 5 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
NETWORKING
2007
15 years 1 months ago
Performance and Equilibrium Analysis of Heterogeneous IEEE 802.11 Based WLANs
This paper presents a general model to study the medium access control (MAC) layer performance and equilibrium of WLANs consisting of nodes with different MAC parameters (e.g., ba...
Hao Zhu
CCECE
2009
IEEE
15 years 5 months ago
Performance analysis of best effort support in broadband IEEE 802.16 networks
This paper presents a performance analysis of best effort support over the MAC protocol proposed in the IEEE 802.16 standard. We focus on the uplink channel since it is the critic...
Victor Rangel, Javier Gomez, Javier Chapa, Miguel ...
IFIP
2000
Springer
15 years 3 months ago
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations
: IEEE 802.11 is a wireless network standard that was completed in 1997. Unfortunately, the medium access protocol described in the standard meets some problems that arise from the...
Marek Natkaniec, Andrzej R. Pach