Sciweavers

4761 search results - page 197 / 953
» Performance of Protocols
Sort
View
MSS
2003
IEEE
95views Hardware» more  MSS 2003»
15 years 9 months ago
Design and Implementation of a Block Storage Multi-Protocol Converter
We present the Block Storage Multi-Protocol Converter (BSMC) software architecture, which is able to translate and manage SCSI commands carried by different SCSI transport protoco...
Irina Gerasimov, Alexey Zhuravlev, Mikhail Pershin...
CONEXT
2007
ACM
15 years 6 months ago
Towards a clustering based data diffusion protocol in delay tolerant networks
In Delay Tolerant Networks (DTN), diffusion protocols can benefit from the users’ mobility in order to reach some distant nodes. However, existing protocols like flooding pres...
Sana Tmar, Eric Fleury
SEC
2001
15 years 5 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater
PDPTA
2003
15 years 5 months ago
Analysis and Enhancement of Pipelining the Protocol Overheads for a High Throughput
This paper investigates the protocol overhead pipelining between the host and network interface card (NIC). Existing researches into the protocol overhead pipelining assume that p...
Hyun-Wook Jin, Chuck Yoo
ADHOC
2005
134views more  ADHOC 2005»
15 years 4 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun