Sciweavers

1777 search results - page 170 / 356
» Programming Cryptographic Protocols
Sort
View
WSC
1998
15 years 2 months ago
MPI-SIM: Using Parallel Simulation to Evaluate MPI Programs
This paper describes the design and implementation of MPI-SIM, a library for the execution driven parallel simulation of MPI programs. MPI-LITE, a portable library that supports m...
Sundeep Prakash, Rajive Bagrodia
JOT
2007
95views more  JOT 2007»
15 years 1 months ago
The Infer Type Refactoring and its Use for Interface-Based Programming
Interface-based programming, i.e. the systematic use of interface types in variable declarations, serves the decoupling of classes and increases a program’s changeability. To ma...
Friedrich Steimann
GLOBECOM
2009
IEEE
15 years 8 months ago
LA-MAC: A Load Adaptive MAC Protocol for MANETs
—The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency u...
Weihong Hu, Xiaolong Li, Homayoun Yousefi'zadeh
IFIP
2004
Springer
15 years 6 months ago
Multipath Power Sensitive Routing Protocol for Mobile Ad Hoc Networks
: Mobile Ad hoc Networks are characterized by multi-hop wireless links, without any infrastructure, and frequent host mobility. A plethora of routing protocols has been proposed. A...
Anand Prabhu Subramanian, A. J. Anto, Janani Vasud...
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 2 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol