Sciweavers

2947 search results - page 139 / 590
» The timely token protocol
Sort
View
139
Voted
FM
2008
Springer
77views Formal Methods» more  FM 2008»
15 years 6 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
GLOBECOM
2007
IEEE
15 years 11 months ago
A Novel Performance Model for Distributed Prioritized MAC Protocols
—Distributed prioritized channel access mechanisms have been adopted by the IEEE 802.11e enhanced distributed channel access (EDCA) and the Multiband OFDM Alliance prioritized ch...
Xinhua Ling, Kuang-Hao Liu, Yu Cheng, Xuemin Shen,...
APNOMS
2007
Springer
15 years 11 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
DATE
2000
IEEE
103views Hardware» more  DATE 2000»
15 years 9 months ago
Protocol Stack-Based Telecom-Emulator
The paper describes the concept and implementation of a telecom emulator that features both recon gurability and high-speed processing. The emulator can be easily transmuted into ...
Takahiro Murooka, Toshiaki Miyazaki
STOC
1998
ACM
96views Algorithms» more  STOC 1998»
15 years 9 months ago
Randomized Protocols for Low Congestion Circuit Routing in Multistage Interconnection Networks
In this paper we study randomized algorithms for circuit switching on multistage networks related to the butterfly. We devise algorithms that route messages by constructing circu...
Richard Cole, Bruce M. Maggs, Friedhelm Meyer auf ...