Sciweavers

382 search results - page 10 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
106
Voted
MMB
2001
Springer
141views Communications» more  MMB 2001»
15 years 4 months ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
INFOCOM
2006
IEEE
15 years 5 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
TWC
2010
14 years 6 months ago
Multi-hop MIMO relay networks: diversity-multiplexing trade-off analysis
A multi-hop relay network with multiple antenna terminals in a quasi-static slow fading environment is considered. The fundamental diversity-multiplexing gain tradeoff (DMT) is an...
Deniz Gündüz, Mohammad Ali Khojastepour,...
110
Voted
JAVA
2001
Springer
15 years 4 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
71
Voted
MSS
2003
IEEE
98views Hardware» more  MSS 2003»
15 years 5 months ago
A Performance Analysis of the iSCSI Protocol
Fibre channel has long dominated the realm of storage area networks (SAN’s). However, with increased development and refining, iSCSI is fast becoming an equal contender, which ...
Stephen Aiken, Dirk Grunwald, Andrew R. Pleszkun, ...