Sciweavers

4761 search results - page 127 / 953
» Performance of Protocols
Sort
View
131
Voted
ESORICS
2003
Springer
15 years 9 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
130
Voted
ICPP
2009
IEEE
15 years 10 months ago
Performance Limits of Fair-Access in Underwater Sensor Networks
—This paper investigates fundamental performance limits of medium access control (MAC) protocols for particular underwater multi-hop sensor networks under a fair-access criterion...
Yang Xiao, Miao Peng, John H. Gibson, Geoffrey G. ...
155
Voted
PE
2002
Springer
124views Optimization» more  PE 2002»
15 years 3 months ago
Continuous-time hidden Markov models for network performance evaluation
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
Wei Wei, Bing Wang, Donald F. Towsley
136
Voted
ICMCS
2008
IEEE
134views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Performance measurements and evaluation of video streaming in HSDPA networks with 16QAM modulation
The High-Speed Downlink Packet Access (HSDPA) communication protocol improves downlink performance on mobile networks and is currently being deployed in networks around the world....
Haakon Riiser, Pål Halvorsen, Carsten Griwod...
115
Voted
ISCC
2009
IEEE
201views Communications» more  ISCC 2009»
15 years 10 months ago
Adaptive Smooth Simulcast Protocol for multimedia transmission
We introduce Adaptive Smooth Simulcast Protocol (ASSP) for simulcast transmission over best-effort networks. ASSP is a new multiple-rate protocol that implements a single rate TCP...
Christos Bouras, Apostolos Gkamas, Georgios Kioumo...