Sciweavers

4693 search results - page 841 / 939
» Verifying Hybrid Systems
Sort
View
129
Voted
ITIIS
2010
154views more  ITIIS 2010»
14 years 7 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
103
Voted
JCIT
2010
131views more  JCIT 2010»
14 years 7 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
97
Voted
JDCTA
2010
143views more  JDCTA 2010»
14 years 7 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
STTT
2010
120views more  STTT 2010»
14 years 7 months ago
Solving the ignoring problem for partial order reduction
Abstract. Partial order reduction limits the state explosion problem that arises in model checking by limiting the exploration of redundant interleavings. A state space search algo...
Sami Evangelista, Christophe Pajault
117
Voted
TON
2010
127views more  TON 2010»
14 years 7 months ago
Queue Dynamics With Window Flow Control
This paper develops a new model that describes the queueing process of a communication network when data sources use window flow control. The model takes into account the burstines...
Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, ...