Sciweavers

2947 search results - page 122 / 590
» The timely token protocol
Sort
View
133
Voted
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 5 months ago
On the long time behavior of the TCP window size process
The TCP window size process appears in the modeling of the famous Transmission Control Protocol used for data transmission over the Internet. This continuous time Markov process t...
Djalil Chafaï, Florent Malrieu, Katy Paroux
COMCOM
2006
115views more  COMCOM 2006»
15 years 5 months ago
IPv6 deployment: Real time applications and QoS aspects
This paper gives an overview of the issues related to the QoS mechanisms under IPv6 and the transition of applications to the new Internet protocol. We describe the implementation...
Christos Bouras, Apostolos Gkamas, Dimitris Primpa...
JSAC
2011
144views more  JSAC 2011»
14 years 7 months ago
Time and Location-Critical Emergency Message Dissemination for Vehicular Ad-Hoc Networks
—One promise of Vehicular Ad-hoc Networks (VANET) is to considerably increase road safety and travel comfort by enabling inter-vehicle communications. Among a vast array of poten...
Yanyan Zhuang, Jianping Pan, Yuanqian Luo, Lin Cai
TCS
2010
14 years 11 months ago
Weak bisimulation for Probabilistic Timed Automata
We are interested in describing timed systems that exhibit probabilistic behaviour. To this purpose, we consider a model of Probabilistic Timed Automata and introduce a concept of ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
IACR
2011
124views more  IACR 2011»
14 years 4 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang