• Nenhum resultado encontrado

[PDF] Top 20 Formal verification of communication protocols for wireless networks

Has 10000 "Formal verification of communication protocols for wireless networks" found on our website. Below are the top 20 most common "Formal verification of communication protocols for wireless networks".

Formal verification of communication protocols for wireless networks

Formal verification of communication protocols for wireless networks

... C172f Formal verification of communication protocols for wireless networks / Daniel Câmara— Belo Horizonte, 2009. Orientador: Antônio Alfredo Ferreira Loureiro[r] ... See full document

137

EFFECTIVE ANALYSIS ON R-LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS

EFFECTIVE ANALYSIS ON R-LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS

... group of nodes which ranges from few to several hundred or even ...consists of small light weighted wireless nodes called sensor ...size of a back-pack to the size of grain dust. The ... See full document

11

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

... IKDM [29] is an Improved Key Distribution Mechanism, based on hierarchical network architecture and bivariate polynomial-key pre-distribution mechanism. In IKDM, each sensor has a unique id in the network. An offline Key ... See full document

11

Formal verification of parallel C+MPI programs

Formal verification of parallel C+MPI programs

... steps of protocol specification and protocol verification. The focus of this thesis is on protocol verification, although the overall traits of protocol specification are also ...a ... See full document

113

Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks

Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks

... randomized protocols can indeed be efficient and should be regarded as a valid solution for practical fault- and intrusion-tolerant distributed ...randomized protocols, in particu- lar those of the ... See full document

209

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols

... classes of graphs that at least include the clique ...considered networks in which the underlying topology is in between the class of cliques and the strictly larger class of bounded diameter ... See full document

10

Verification of vehicular networks using probabilistic model checking

Verification of vehicular networks using probabilistic model checking

... from communication to vehicular traffic ...Specifications of APIs for coupling traffic flow and networking simulators (2) Modeling how drivers react to the additional information provided by VANETs (3) ... See full document

183

Performance assessment of real-time data management on wireless sensor networks

Performance assessment of real-time data management on wireless sensor networks

... class of simulators is the oriented network. They emphasize on the behavior of the wireless network and the protocol stack of the ...top of a NS-2 802.11 network model and it models a ... See full document

165

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

... consists of number of sensor nodes that are randomly deployed in the area that is called as sensor fields or field of observation ...problem of charging when battery runs ...necessary. ... See full document

4

Formal Modeling and Verification of Time- Constrained ARQ Protocols with Event-B

Formal Modeling and Verification of Time- Constrained ARQ Protocols with Event-B

... (ARQ) protocols [1] are widely used in modern data communications to guarantee reliable transmission between a sender and a receiver over unreliable communication ...principle of retransmission upon ... See full document

10

Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

... in wireless networks have enabled us to deploy and use mobile ad hoc networks for communication between the rescue officers in disaster recovery and reconstruction ...topology of the ... See full document

9

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

... most of the routing protocols are not designed to be intrusion ...some protocols as the three studied on this chapter that do provide some mechanisms to cope with ...damage of such ... See full document

114

Development of Open source-based automatic shooting and processing UAV imagery for Orthoimage Using Smart Camera UAV

Development of Open source-based automatic shooting and processing UAV imagery for Orthoimage Using Smart Camera UAV

... usage of real-time correction of UAV location through non-datum ...acquisition of high resolution and high precision still images and DEM productions for evaluation part for accuracy of ... See full document

4

Formal verification of PLC programs using the B Method

Formal verification of PLC programs using the B Method

... Controladores Lógico Programáveis (PLCs — Programmable Logic Controllers, em inglês) desempenham funções de controle, recebendo informações do ambiente, processando-as e modificando este ambiente de acordo com os ... See full document

177

Priority Based Congestion Control Routing in Wireless Mesh Network

Priority Based Congestion Control Routing in Wireless Mesh Network

... indicates wireless mesh networks is a mesh networks that can be implemented over wireless ...infrastructure of wireless mesh network is that it forms a mesh in such a way that ... See full document

5

Monitoring of urban transportation networks using wireless sensor networks

Monitoring of urban transportation networks using wireless sensor networks

... ways of improving transportation ...possibility of reacting to the overload- ing/overcrowding of vehicles in certain ...availability of vehicle load information in real time, which can be ... See full document

59

Soluções cientes de agregação de dados da correlação espaço-temporal e consumo de energia para realizar coleta de dados em redes de sensores sem fio

Soluções cientes de agregação de dados da correlação espaço-temporal e consumo de energia para realizar coleta de dados em redes de sensores sem fio

... 50% of the ontrol messages used by InFRA in the o urren e of 6 events and, on average, only 29% of the ontrol messages used by InFRA to build the routing stru ... See full document

136

FREQUENCY ANALYSIS OF RLE-BLOCKS REPETITIONS IN THE SERIES OF BINARY CODES WITH OPTIMAL MINIMAX CRITERION OF AUTOCORRELATION FUNCTION

FREQUENCY ANALYSIS OF RLE-BLOCKS REPETITIONS IN THE SERIES OF BINARY CODES WITH OPTIMAL MINIMAX CRITERION OF AUTOCORRELATION FUNCTION

... Signal design for good correlation for wireless communication, cryptography and radar.[r] ... See full document

5

Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

... Model based approach has been standard practice in electrical and mechanical design and other disciplines for many years. Mechanical engineering transitioned from the drawing board to increasingly more sophisticated ... See full document

17

Modeling of Two-Stage Solidification: Part II Computational Verification of the Model

Modeling of Two-Stage Solidification: Part II Computational Verification of the Model

... Modeling of hypoeutectic alloys solidification is a complex problem, because increase of solid phase fraction is triggered by constitution of two structures: In the first stage, between eutectic and ... See full document

6

Show all 10000 documents...