Sciweavers

4761 search results - page 59 / 953
» Performance of Protocols
Sort
View
ENTCS
2006
137views more  ENTCS 2006»
14 years 9 months ago
Automated Security Protocol Analysis With the AVISPA Tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
Luca Viganò
SIGSOFT
2007
ACM
15 years 10 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
GLOBECOM
2007
IEEE
15 years 4 months ago
Cognitive Adaptation for Teams in ADROIT
— We have created a sensor-sharing protocol that uses cognition to increase performance by choosing protocol parameters based on the current environment and the past relationship...
Gregory Troxel, Armando Caro, Isidro Castineyra, N...
AINA
2006
IEEE
15 years 3 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
JNW
2008
103views more  JNW 2008»
14 years 9 months ago
Mobility Metrics Evaluation for Self-Adaptive Protocols
Cross-layer mechanism, for which a protocol locating at a given layer uses information issued from other layers, may enhance the mobile networks performance. Some of those mechanis...
Cholatip Yawut, Béatrice Paillassa, Riadh D...