Sciweavers

1080 search results - page 57 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
WDAG
2000
Springer
87views Algorithms» more  WDAG 2000»
15 years 1 months ago
A Probabilistically Correct Leader Election Protocol for Large Groups
This paper presents a scalable leader election protocol for large process groups with a weak membership requirement. The underlying network is assumed to be unreliable but characte...
Indranil Gupta, Robbert van Renesse, Kenneth P. Bi...
IJNSEC
2007
123views more  IJNSEC 2007»
14 years 10 months ago
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
In this paper a secure error-signalling scheme for packetswitched network architectures is presented. Current solutions are based on the Internet Control Message Protocol to deliv...
Theodore Stergiou, Dimitrios L. Delivasilis
MOBIHOC
2008
ACM
15 years 9 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan
SECURWARE
2008
IEEE
15 years 4 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
COMCOM
2006
103views more  COMCOM 2006»
14 years 10 months ago
Energy efficiency of collision resolution protocols
Energy consumption of the medium access control (MAC) algorithm is one of the key performance metrics in today's ubiquitous wireless networks of battery-operated devices. We ...
Aran Bergman, Moshe Sidi