Sciweavers

2234 search results - page 40 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
ICSM
1995
IEEE
15 years 2 months ago
Domain-retargetable reverse engineering. III. Layered modeling
This paper describes ongoing work on a domainretargetable reverse engineering environment which is used to aid the structural understanding of large information spaces. In particu...
Scott R. Tilley

Publication
304views
16 years 9 months ago
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with Connectionless Network Layer
We propose a scheme for congestion avoidance in networks using a connectionless protocol at the network layer. The scheme uses a minimal amount of feedback from the network to the ...
K. Ramakrishnan and R. Jain
BPM
2004
Springer
110views Business» more  BPM 2004»
15 years 4 months ago
Integration of Multi-attributed Negotiations within Business Processes
For the integration of electronic negotiation systems within information systems, it is essential to model both using the same modelling paradigm to avoid frictions. We develop a g...
Carlo Simon, Michael Rebstock
EUC
2007
Springer
15 years 5 months ago
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems
Networked embedded systems present unique challenges for system designers composing distributed applications with dyanmic, real-time, and resilience requirements. We consider the ...
Binoy Ravindran, Edward Curley, Jonathan Stephen A...
AINA
2010
IEEE
14 years 2 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...