Sciweavers

1080 search results - page 76 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
COMPSEC
2008
138views more  COMPSEC 2008»
14 years 10 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
WSC
1997
14 years 11 months ago
AutoStat: Output Statistical Analysis for AutoMod Users
AutoStat™ is an extension package for AutoMod™ and AutoSched™ models that provides complete support for simulation model experimentation and statistical analysis of outputs....
John S. Carson II
AOSD
2007
ACM
15 years 2 months ago
Using natural language program analysis to locate and understand action-oriented concerns
Most current software systems contain undocumented high-level ideas implemented across multiple files and modules. When developers perform program maintenance tasks, they often wa...
David Shepherd, Zachary P. Fry, Emily Hill, Lori L...
JSAC
2008
112views more  JSAC 2008»
14 years 10 months ago
System Design Considerations for Undersea Networks: Link and Multiple Access Protocols
Abstract--We address several inter-related aspects of underwater network design within the context of a cross-layer approach. We first highlight the impact of key characteristics o...
Nathan Parrish, Leonard T. Tracy, Sumit Roy, Payma...
ICC
2009
IEEE
15 years 4 months ago
HELP: // Hypertext In-Emergency Leveraging Protocol
—This paper proposes HELP://, a simple light-weight protocol that runs over HTTP and is used to disseminate information from a server(s) to its clients during the time of a crisi...
Mina Guirguis, Hideo Goto