Sciweavers

2947 search results - page 97 / 590
» The timely token protocol
Sort
View
ASPLOS
1994
ACM
15 years 8 months ago
Software Overhead in Messaging Layers: Where Does the Time Go?
Despite improvements in network interfaces and software messaging layers, software communication overhead still dominates the hardware routing cost in most systems. In this study,...
Vijay Karamcheti, Andrew A. Chien
MDM
2010
Springer
173views Communications» more  MDM 2010»
15 years 9 months ago
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs
—The support of distributed atomic transactions in mobile ad-hoc networks (MANET) is a key requirement for many mobile application scenarios. Atomicity is a fundamental property ...
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
ESORICS
2002
Springer
16 years 4 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe
INDOCRYPT
2009
Springer
15 years 11 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
146
Voted
IWSOS
2007
Springer
15 years 10 months ago
A New Approach to Adaptive Multi-routing Protocol for Mobile Ad Hoc Network
A routing protocol is designed considering a particular environment all the time which is not possible in the case of practical ad hoc networks. Because of the uncertainty in topol...
Ung Heo, Deepak G. C., Jaeho Choi