Sciweavers

1080 search results - page 41 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
EWSN
2006
Springer
15 years 11 months ago
A Measurement-Based Analysis of the Interaction Between Network Layers in TinyOS
There have been a number of recent proposals for link and network-layer protocols in the sensor networking literature, each of which claims to be superior to other approaches. Howe...
Umberto Malesci, Samuel Madden
ICPADS
2000
IEEE
15 years 4 months ago
Java 2 Distributed Object Models Performance Analysis, Comparison and Optimization
This paper is focused on the performance analysis, comparison and optimization of the most important distributed object models for Java: RMI (Remote Method Invocation) and RMI-IIO...
Matjaz B. Juric, Ivan Rozman, Alan P. Stevens, Mar...
GLOBECOM
2008
IEEE
15 years 6 months ago
Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks
Abstract—We develop and evaluate a new method for estimating and optimizing various performance metrics for multihop wireless networks, including MANETs. We introduce an approxim...
John S. Baras, Vahid Tabatabaee, George Papageorgi...
FOSAD
2009
Springer
15 years 6 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 11 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo