Sciweavers

1777 search results - page 161 / 356
» Programming Cryptographic Protocols
Sort
View
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 6 months ago
H2 performance of agreement protocol with noise: An edge based approach
— This work presents an H2 performance analysis of the agreement protocol in the presence of noise. The agreement protocol is first transformed into an equivalent system induced...
Daniel Zelazo, Mehran Mesbahi
97
Voted
EUROPAR
2007
Springer
15 years 7 months ago
Starvation-Free Transactional Memory-System Protocols
Abstract. Transactional memory systems trade ease of programming with runtime performance losses in handling transactions. This paper focuses on starvation effects that show up in ...
M. M. Waliullah, Per Stenström
IFIP
2004
Springer
15 years 6 months ago
GPS-Based Route Discovery Algorithms for On-Demand Routing Protocols in MANETs
Abstract. This papers presents new Global Positioning System (GPS)based route discovery algorithms for on-demand routing in MANETs, called Position-based Selective Flooding (PSF). ...
Mehran Abolhasan, Tadeusz A. Wysocki
FORTE
2007
15 years 2 months ago
Specifying and Composing Interaction Protocols for Service-Oriented System Modelling
Abstract. We present and discuss a formal, high-level approach to the specification and composition of interaction protocols for service-oriented systems. This work is being develo...
João Abreu, Laura Bocchi, José Luiz ...
GLOBECOM
2007
IEEE
15 years 7 months ago
Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands
— In this paper we propose Cognitive Medium Access (CMA), a protocol aimed at improving coexistence with a set of independently evolving WLAN bands. A time-slotted physical layer...
Stefan Geirhofer, Lang Tong, Brian M. Sadler