Sciweavers

2947 search results - page 134 / 590
» The timely token protocol
Sort
View
DSN
2003
IEEE
15 years 10 months ago
Cost-Optimization of the IPv4 Zeroconf Protocol
This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfig...
Henrik C. Bohnenkamp, Peter van der Stok, Holger H...
CAISE
1999
Springer
15 years 9 months ago
CPAM, A Protocol for Software Composition
Software composition is critical for building large-scale applications. In this paper, we consider the composition of components that are methods offered by heterogeneous, autonomo...
Laurence Melloul, Dorothea Beringer, Neal Sample, ...
CORR
2010
Springer
207views Education» more  CORR 2010»
15 years 5 months ago
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
This paper presents a simple local medium access control protocol, called Jade, for multi-hop wireless networks with a single channel that is provably robust against adaptive adver...
Andréa W. Richa, Christian Scheideler, Stef...
126
Voted
CN
2000
64views more  CN 2000»
15 years 4 months ago
Risks of the Passport single signon protocol
Passport is a protocol that enables users to sign onto many different merchants' web pages by authenticating themselves only once to a common server. This is important becaus...
David P. Kormann, Aviel D. Rubin
NETWORK
2007
159views more  NETWORK 2007»
15 years 4 months ago
A Generic Framework for Modeling MAC Protocols in Wireless Broadband Access Networks
In this article, we present a simple yet accurate generic analytical model for a family of slotted carrier sense multiple access with collision avoidance (CSMA/CA) based medium ac...
Xinhua Ling, Jon W. Mark, Xuemin Shen, Yu Cheng