Sciweavers

2947 search results - page 130 / 590
» The timely token protocol
Sort
View
PADS
1999
ACM
15 years 9 months ago
Active Virtual Network Management Protocol
This paper introduces a novel algorithm, the Active Virtual Network Management Protocol AVNMP, for predictive network management. It explains how the Active Virtual Network Mana...
Stephen F. Bush
DIALM
2000
ACM
107views Algorithms» more  DIALM 2000»
15 years 8 months ago
Efficient memoryless protocol for tag identification
This paper presents an efficient collision resolution protocol and its variations for the tag identification problem, where an electromagnetic reader attempts to obtain within its...
Ching Law, Kayi Lee, Kai-Yeung Siu
132
Voted
PEWASUN
2008
ACM
15 years 6 months ago
The impact of delayed topology information in proactive routing protocols for MANETS
In the design of many proactive routing protocols for MANETs, it is often assumed that topology information is disseminated instantly and error free. Exceptions include hazysighte...
Andres Medina, Stephan Bohacek
MASCOTS
1998
15 years 6 months ago
Simulation-based 'STRESS' Testing Case Study: A Multicast Routing Protocol
In this work, we propose a method for using simulation to analyze the robustness of multiparty (multicastbased) protocols in a systematic fashion. We call our method Systematic Te...
Ahmed Helmy, Deborah Estrin
130
Voted
JLP
2008
75views more  JLP 2008»
15 years 4 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...