Sciweavers

453 search results - page 91 / 91
» Using Symbolic Simulation for Bounded Property Checking
Sort
View
PE
2010
Springer
212views Optimization» more  PE 2010»
14 years 6 months ago
Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation
In today's Internet, a large part of the traffic is carried using the TCP transport protocol. Characterization of the variations of TCP traffic is thus a major challenge, bot...
Patrick Loiseau, Paulo Gonçalves, Julien Ba...
MOBIHOC
2005
ACM
15 years 11 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
MDM
2010
Springer
173views Communications» more  MDM 2010»
15 years 4 months ago
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs
—The support of distributed atomic transactions in mobile ad-hoc networks (MANET) is a key requirement for many mobile application scenarios. Atomicity is a fundamental property ...
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri