Sciweavers

4761 search results - page 180 / 953
» Performance of Protocols
Sort
View
HASKELL
2009
ACM
15 years 10 months ago
Roll your own test bed for embedded real-time protocols: a haskell experience
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a casestudy, we implement a simple emulator for the Biphase...
Lee Pike, Geoffrey M. Brown, Alwyn Goodloe
CCS
2006
ACM
15 years 7 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
CORR
2010
Springer
72views Education» more  CORR 2010»
15 years 3 months ago
Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee
Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worstcase sys...
Kenneth W. Shum, Wing Shing Wong
246
Voted
ICNP
2002
IEEE
15 years 9 months ago
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from trad...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
SECON
2008
IEEE
15 years 10 months ago
TCP Performance in Coded Wireless Mesh Networks
This paper investigates the benefit of network coding for TCP traffic in a wireless mesh network. We implement network coding in a real wireless mesh network and measure TCP thr...
Yong Huang, Majid Ghaderi, Donald F. Towsley, Weib...