The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocol with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1970 (21) 1971 (35) 1972 (19) 1973 (20) 1974 (16) 1975-1976 (39) 1977 (18) 1978 (22) 1979 (23) 1980 (28) 1981 (44) 1982 (88) 1983 (118) 1984 (143) 1985 (130) 1986 (127) 1987 (155) 1988 (208) 1989 (222) 1990 (251) 1991 (312) 1992 (327) 1993 (365) 1994 (375) 1995 (448) 1996 (551) 1997 (616) 1998 (703) 1999 (935) 2000 (1117) 2001 (1265) 2002 (1622) 2003 (2040) 2004 (2750) 2005 (3484) 2006 (3806) 2007 (3999) 2008 (3942) 2009 (3029) 2010 (1931) 2011 (1819) 2012 (1829) 2013 (1898) 2014 (1817) 2015 (1900) 2016 (1767) 2017 (1908) 2018 (1966) 2019 (2065) 2020 (1967) 2021 (2020) 2022 (1949) 2023 (1934) 2024 (379)
Publication types (Num. hits)
article(22825) book(22) data(7) incollection(146) inproceedings(37189) phdthesis(341) proceedings(31) www(1)
Venues (Conferences, Journals, ...)
RFC(2172) CoRR(1649) Wirel. Pers. Commun.(698) ICC(695) IEEE Access(627) IACR Cryptol. ePrint Arch.(593) GLOBECOM(518) Sensors(490) LCN(479) WCNC(442) ISCC(425) Comput. Commun.(422) Wirel. Networks(374) INFOCOM(358) IEEE J. Sel. Areas Commun.(354) PIMRC(336) More (+10 of total 4934)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 31248 occurrences of 6773 keywords

Results
Found 60562 publication records. Showing 60562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Yunhong Gu, Xinwei Hong, Robert L. Grossman Experiences in Design and Implementation of a High Performance Transport Protocol. Search on Bibsonomy SC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF UDT, Performance, Design, design, implementation, transport protocol, Experimentation, data intensive application
19Dieter Hogrefe Main issues in protocol testing. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF IPv6, SDL, MSC, Protocol testing, TTCN
19Alberto Verdejo, Isabel Pita, Narciso Martí-Oliet Specification and Verification of the Tree Identify Protocol of IEEE 1394 in Rewriting Logic. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Tree identify protocol, Rewriting logic, Maude, Object-oriented specifications, IEEE 1394
19Burton S. Kaliski Jr. An unknown key-share attack on the MQV key agreement protocol. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MQV, unknown key-share attack, Key agreement, protocol design
19Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
19Yacine Bouzida, Rachid Beghdad Improving the Timed Token Protocol. Search on Bibsonomy ICN (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF non-real-time messages, scheduling messages, timed token, regular timed token, scheduling constraints, real-time protocol, local networks
19Stelvio Cimato Design of an Authentication Protocol for Gsm Javacards. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Javacard, E-commerce and M- commerce security, Authentication protocol
19Wen-Tsuen Chen, Sheng-Hsien Chen, Jen-Chu Liu An Efficient QoS Guaranteed MAC Protocol in Wireless ATM Networks. Search on Bibsonomy ICOIN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF WATM, CRPMA/DS, DTDMA/PR, QoS, MAC protocol
19Natalia Sidorova, Martin Steffen Verification of a wireless ATM medium-access protocol. Search on Bibsonomy APSEC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medium-access protocol verification, modular structure, SDL specification, abstraction techniques, system debugging, untimed properties, time-dependent properties, model checking, formal specification, formal verification, wireless LAN, asynchronous transfer mode, access protocols, state space reduction, wireless ATM
19Roberto Giorgi, Cosimo Antonio Prete PSCR: A Coherence Protocol for Eliminating Passive Sharing in Shared-Bus Shared-Memory Multiprocessors. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF performance evaluation, multiprocessor, Cache memory, coherence protocol
19Hatem Bettahar, Abdelmadjid Bouabdallah A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF delay-constrained shared trees, QoS, shared tree, multicast routing protocol
19Gerard Parr, Kevin Curran Dynamic multimedia protocol stacks. Search on Bibsonomy Softw. Concepts Tools The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Object frameworks, Distributed systems, Multimedia, Middleware, Protocol, Continuous media
19Kathi Fisler, Claude Girault Modelling and Model Checking a Distributed Shared Memory Consistency Protocol. Search on Bibsonomy ICATPN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Protocol design and verification, model checking, distributed shared memory, high level Petri nets, memory consistency
19Govind Krishnamurthi, Stefano Chessa, Arun K. Somani Fast Recovery Protocol for Database and Link Failures in Mobile Networks. Search on Bibsonomy ICCCN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF database failures, recovery protocol, location management, PCS networks
19Pierre N. Robillard, Patrick d'Astous, Françoise Détienne, Willemien Visser An empirical method based on protocol analysis to analyze technical review meetings. Search on Bibsonomy CASCON The full citation details ... 1998 DBLP  BibTeX  RDF cognitive activity, technical review meeting, software engineering, collaborative work, empirical methods, protocol analysis
19Gavin Lowe, A. W. Roscoe 0001 Using CSP to Detect Errors in the TMN Protocol. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF protocol failure, model checking, cryptography, Security protocols, CSP, key establishment, FDR
19Michael K. Reiter A Secure Group Membership Protocol. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF group membership protocol, Security, distributed systems, reliability, Byzantine failures
19Jianying Zhou 0001, Dieter Gollmann A Fair Non-repudiation Protocol. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party
19Eric Platt, Barry Robson Practical use of a fully automatic homology-based protein modelling protocol. Search on Bibsonomy HICSS (5) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF fully automatic homology-based protein modelling protocol, tertiary structure prediction, HOM FOLD, fragment-based approach, GLOBAL language, energy refinement, X-ray crystallographic data, reproducibilty, 1.80 angstrom, rule based system, interactive modelling, biology computing, proteins, algorithm performance, molecular configurations, molecular biophysics
19Mohd Fadzil Hassan 0001, Dave Robertson 0001 Constraint Relaxation Approach for Over-Constrained Agent Interaction. Search on Bibsonomy PRICAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Over-constrained agent interaction, brittle agent protocol, Distributed Partial CSP and agent protocol
19Olivier Rütti, Pawel T. Wojciechowski, André Schiper Service interface: a new abstraction for implementing and composing protocols. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dynamic protocol replacement, protocol frameworks, modularity
19Amre El-Hoiydi, Jean-Dominique Decotignie Low Power Downlink MAC Protocols for Infrastructure Wireless Sensor Networks. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low power protocol, infrastructure network, wireless sensor network, medium access control, energy efficient protocol, downlink
19Dev Anshul, Suman Roy 0001 A ZKP-based identification scheme for base nodes in wireless sensor networks. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF guillou-quisquater protocol, sensor and ad hoc networks, security protocols, wireless security, base stations, zero-knowledge protocol, entity authentication
19Joseph Y. H. So, Jidong Wang, David Jones SHIP Mobility Management Hybrid SIP-HIP Scheme. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Session Initiation Protocol (SIP), mobility management, Host Identity Protocol (HIP)
19Erik Jan Marinissen The Role of Test Protocols in Automated Test Generation for Embedded-Core-Based System ICs. Search on Bibsonomy J. Electron. Test. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF system chips, test protocol, test protocol scheduling, test generation, expansion, embedded cores
19Andreas Schmid 0002, Olaf Kandel, Christoph Steigner Avoiding Counting to Infinity in Distance Vector Routing. Search on Bibsonomy ICN (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Routing Information Protocol, Counting to Infinity, Internet, Protocol Design
19Yu-Kwong Kwok, Vincent K. N. Lau A Performance Study of Multiple Access Control Protocols for Wireless Multimedia Services. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF integrated voice/data communication, packet reservation multiple access, multiple access control protocols, wireless multimedia services, broadband wireless multimedia network, user traffic requirements, channel bandwidth allocation, TDMA-based MAC protocols, integrated wireless data/voice services, SCAMA, DTDMA/VR, DTDMA/PR, D4RUMA, DPRMA, DSA++, PRMA/DA, orthogonal design, quality of service, quality of service, performance, asynchronous transfer mode, multimedia communication, time division multiple access, MAC protocol, telecommunication traffic, access protocols, protocol designs, CBR, VBR, broadband networks, packet radio networks, ABR, wireless ATM network
19Robert N. Smith, Balan Mahesh, Sharada Bindiganavale An adaptive mobile wireless handover. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF adaptive mobile wireless handover, mobile assisted look ahead handover protocol, self position locating feature, network layer protocol, preconceived optimal candidate parent base station list, mobile unit, pilot/beacon channel signal, quality of service, probability, redundancy, redundancy, triangulation
19Charbel Sakr, Terence D. Todd Carrier-sense protocols for packet-switched smart antenna basestations. Search on Bibsonomy ICNP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF carrier-sense protocols, packet-switched smart antenna basestations, packet-switched data networks, reverse-link performance, CSMA/SDMA protocol, capacity performance, sophisticated protocol, protocols, CSMA, SDMA
19John C. Mitchell, Mark Mitchell, Ulrich Stern Automated analysis of cryptographic protocols using Mur-phi. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF cryptographic protocol analysis, Mur/spl phi/, general-purpose state enumeration tool, security-related protocols, faulty TMN protocol, replay attack detection, cryptography, methodology, errors, client server system, network operating system, computation time, Kerberos
19Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
19Hiroaki Kigaki, Makoto Takizawa 0001 Group communication approach for flexible distributed systems. Search on Bibsonomy ISPAN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF flexible distributed systems, updating application software, multiple processes, protocol errors, distributed systems, parallel programming, protocol, groupware, distributed processing, checkpointing, rollback recovery, timeout, message transmission, process group
19Ki Won Lee, Christos J. Georgiou, Chung-Sheng Li Ultra High-Speed Networking Solution: Fibre Channel Architecture and Its Implementation. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF protocol engine real-time protocol processing, High speed networking, Fibre Channel
19Alois Ferscha, Johannes Lüthi Estimating rollback overhead for optimism control in Time Warp. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF rollback overhead, adaptive optimism control mechanism, performance pitfall, Time Warp distributed discrete event simulation protocol, DDES protocol, overoptimistic progression, event execution, simulated future, premature event execution, causality violations, performance inefficiencies, observed model parallelism, local virtual time, LVT progression per unit CPU time, arriving messages, simulation engine, optimal CPU delay interval, rollback probability, synchronization behavior, iPSC/860, protocols, virtual machines, discrete event simulation, adaptive systems, optimal control, cost model, distributed memory multiprocessor, time warp simulation, logical processes
19N. Nakamura, N. Kashimura, K. Motomura CMIP to SNMP translation technique based on rule description. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF CMIP to SNMP translation technique, rule description, simple network management protocol, common management information protocol, management information translation, Network Management Forum translation method, CMIP object, SNMP object, management information translation for an integrated system, MITIS, performance, protocols, network management
19O. Catrina Protocol analysis and verification methods, application to the Xpress Transfer protocol 4.0. Search on Bibsonomy PSTV The full citation details ... 1995 DBLP  BibTeX  RDF
19Claus Dendorfer, Rainer Weber From Service Specification to Protocol Entity Impelmentation - An Exercise in Formal Protocol Development. Search on Bibsonomy PSTV The full citation details ... 1992 DBLP  BibTeX  RDF
19Heinz Jürgen Burkhardt, Hans Eckert, Alfred Giessler Testing of protocol implementations. A systematic approach to derivation of test sequences form global protocol specifications. Search on Bibsonomy PSTV The full citation details ... 1985 DBLP  BibTeX  RDF
19Jean-Pierre Ansart GENEPI/A-A Protocol Independent System for Testing Protocol Implementation. Search on Bibsonomy PSTV The full citation details ... 1982 DBLP  BibTeX  RDF
19Amr A. El-Sherif, Andres Kwasinski, Ahmed K. Sadek, K. J. Ray Liu Content-aware multiple access protocol for cooperative packet speech communications. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Hui Cheng, Jiannong Cao 0001, Xiaopeng Fan GMZRP: Geography-aided Multicast Zone Routing Protocol in Mobile Ad Hoc Networks. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hybrid routing, mobile ad hoc networks, multicast
19Yuh-Shyan Chen, Yi-Jiun Liao, Yun-Wei Lin, Ge-Ming Chiu HVE-mobicast: a hierarchical-variant-egg-based mobicast routing protocol for wireless sensornets. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Spatiotemporal multicast, Mobicast, Cluster, Wireless sensor network, Routing
19Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy, Authentication, RFID, Anonymous
19Varun Srinivas, Lu Ruan 0001 An efficient reliable multicast protocol for 802.11-based wireless LANs. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Stephan J. Eidenbenz, Giovanni Resta, Paolo Santi The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cooperation in ad hoc networks, cooperative routing, energy-efficiency, wireless ad hoc networks, topology control
19Vimal K. Khanna, Hari M. Gupta, Satyavardhan Maheshwari A high throughput and low power ad-hoc wireless LAN protocol. Search on Bibsonomy Wirel. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad-hoc wireless LAN, Contention-free transfer, IEEE 802.11, Energy, Power save
19Li Jian An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF E-commerce, Multi-agent
19Abdullah M. S. Alaraj, Malcolm Munro An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Dimitrios Koutsonikolas, Theodoros Salonidis, Henrik Lundgren, Pascal Le Guyadec, Y. Charlie Hu, Irfan Sheriff TDM MAC protocol design and implementation for wireless mesh networks. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Chia-Hung Lin, Bing-Hong Liu, Hong-Yen Yang, Chi-Yen Kao, Ming-Jer Tsai Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional Links. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Bruno Blanchet, Avik Chaudhuri Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF lazy revocation, key rotation, cryptographic access control, automatic verification, secure storage
19Pubali Banerjee, Doug Jacobson, Soumendra Nath Lahiri Security and performance analysis of a secure clustering protocol for sensor networks. Search on Bibsonomy NCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Petr Jurcík, Anis Koubaa, Mário Alves, Eduardo Tovar, Zdenek Hanzálek A Simulation Model for the IEEE 802.15.4 protocol: Delay/Throughput Evaluation of the GTS Mechanism. Search on Bibsonomy MASCOTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GTS, OPNET Modeler, analytical model, simulation model, IEEE 802.15.4
19Zhitang Li, Shudong Shi A Secure Routing Protocol for Mobile Ad hoc Networks. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yehuda Lindell, Benny Pinkas An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bhulai, Pawel Garbacki, Maarten van Steen A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF orig-research
19Mohamed Hefeeda, Hossein Ahmadi 0001 A Probabilistic Coverage Protocol for Wireless Sensor Networks. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jeom Goo Kim, Do Hyeon Lee, Jeong-Bae Lee A Design of Fair Blind Signatures Protocol Using PVNIOT. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF VNIOT Protocols, Network Traffic, Blind Signatures
19Suman Saha, Mitsuji Matsumoto A Framework for Data Collection and Wireless Sensor Network Protocol for Disaster Management. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Nidal Nasser, Yunfeng Chen Secure Multipath Routing Protocol for Wireless Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Kin Wah Kwong, Danny H. K. Tsang A congestion-aware search protocol for heterogeneous peer-to-peer networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Unstructured peer-to-peer networks, Heterogeneous capacity, Searching, Congestion
19Maurice Herlihy, Fabian Kuhn, Srikanta Tirthapura, Roger Wattenhofer Dynamic Analysis of the Arrow Distributed Protocol. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Baris Kayayurt, Tugkan Tuglular End-to-end security implementation for mobile devices using TLS protocol. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Benjamin W. Long, Colin J. Fidge Formally Analysing a Security Protocol for Replay Attacks. Search on Bibsonomy ASWEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Pengyong Ma, Shuming Chen MID: a Novel Coherency Protocol in Chip Multiprocessor. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Yin Yin, Bao Li 0001 Secure Cross-Realm C2C-PAKE Protocol. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19José Ghislain Quenum, Samir Aknine, Onn Shehory, Shinichi Honiden Dynamic Protocol Selection in Open and Heterogeneous Systems. Search on Bibsonomy IAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Chen Dong, Jiandong Li 0001, Jing Ma Multiple access protocol for WLAN based on adaptive token passing with fairness guarantee. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Jichiang Tsai 0001 An Efficient Index-Based Checkpointing Protocol with Constant-Size Control Information on Messages. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF domino effect, communication-induced checkpointing, index-based protocols, fault tolerance, Distributed systems
19Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki Analysis of Probabilistic Trapezoid Protocol for Data Replication. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Nirav Dave, Man Cheuk Ng, Arvind Automatic synthesis of cache-coherence protocol processors using Bluespec. Search on Bibsonomy MEMOCODE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Sangok Kim, Kanghee Lee, Zhefan Jiang, Hyunchul Bae, Sangwook Kim Streaming Player Support Protocol Adaptation and Independent Operating System. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Guilin Wang An abuse-free fair contract signing protocol based on the RSA signature. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing
19Hamed El-Afandi, S. Hossein Hosseini, K. Vairavan A simulation study of the intelligent wireless ad hoc routing (IWAR) protocol. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IWAR, ad hoc protocols, ad hoc network, wireless networking
19Stephan J. Eidenbenz, Giovanni Resta, Paolo Santi COMMIT: A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks with Selfish Nodes. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Satish Verma, Wei Tsang Ooi Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Panlong Yang, Chang Tian Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jichiang Tsai 0001, Jenn-Wei Lin On the Fully-Informed Communication-Induced Checkpointing Protocol. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Mahadevan Subramaniam Preserving Consistency of Runtime Monitors across Protocol Changes. Search on Bibsonomy ICECCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Mahadevan Subramaniam, Jiangfan Shi Using Dominators to Extract Observable Protocol Contexts. Search on Bibsonomy SEFM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Kshirasagar Naik, David S. L. Wei, Danny Krizanc, Sy-Yen Kuo A reservation-based multicast protocol for WDM optical star networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Injong Rhee NC State scientists develop breakthrough internet protocol. Search on Bibsonomy Comput. Entertain. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Xiaojiang Du A Simulation Study of An Energy Efficient Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton A secure and fair DSA-based signature exchange protocol. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Feng Bao 0001, Guilin Wang, Jianying Zhou 0001, Huafei Zhu Analysis and Improvement of Micali's Fair Contract Signing Protocol. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Gang Yao, Dengguo Feng A New k-Anonymous Message Transmission Protocol. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Pedro Uria Recio, Peter Rauch, Koldo Espinosa Link Management Protocol (LMP) Evaluation for SDH/Sonet. Search on Bibsonomy ICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin Syntax and Semantics-Preserving Application-Layer Protocol Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application protocols, semantics, steganography, syntax, SSH
19Tan Wang, Ajit Singh A User Level, Reliable, and Reconfigurable Transport Layer Protocol. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Jie Wu 0001, Fei Dai 0001, Xiaola Lin, Jiannong Cao 0001, Weijia Jia 0001 An Extended Fault-Tolerant Link-State Routing Protocol in the Internet. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Fault tolerance, Internet, routing, loop-free, link-state
19Azzedine Boukerche, Vaidya Sheetal A Performance Evaluation of a Dynamic Source Routing Discovery Optimization Protocol Using GPS System. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF preemptive algorithms, mobile and wireless networks, ad hoc networks, dynamic source routing
19Jonathan Billington, Guy Edward Gallasch, Bing Han A Coloured Petri Net Approach to Protocol Verification. Search on Bibsonomy Lectures on Concurrency and Petri Nets The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Sung Chune Choi, Hee Yong Youn, Joong-Sup Choi Symmetric Tree Replication Protocol for Efficient Distributed Storage System. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed key generation, discrete logarithm, random oracle model, Threshold cryptography, exact security
19Steven Gordon, Lars Michael Kristensen, Jonathan Billington Verification of a Revised WAP Wireless Transaction Protocol. Search on Bibsonomy ICATPN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Noritaka Fukagawa, Noboru Iida, Takashi Watanabe 0001 A Distributed Multimedia Multiple Access Protocol for Adhoc Networks. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Jianbo Gao, Izhak Rubin Analysis of Random Access Protocol under Bursty Traffic. Search on Bibsonomy MMNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Lars-Åke Larzon, Mikael Degermark, Stephen Pink Requirements on the TCP/IP Protocol Stack for Real-Time Communication in Wireless Environments. Search on Bibsonomy QoS-IP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 60562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license