
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2020
- Xu Lu, Hongwei Ding, Zhijun Yang, Liyong Bao, Liqing Wang, Qianlin Liu:
Implementation and performance analysis of random multiple access protocol with variable collision length of multimedia video information. Multim. Tools Appl. 79(23-24): 16547-16571 (2020) - 2019
- Stephan Kleber
, Lisa Maile, Frank Kargl
:
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis. IEEE Commun. Surv. Tutorials 21(1): 526-561 (2019) - Chunyan Fu, Kougen Zheng:
Formal modeling and analysis of ad hoc Zone Routing Protocol in Event-B. Int. J. Softw. Tools Technol. Transf. 21(2): 165-181 (2019) - Federico Sinigaglia
, Roberto Carbone
, Gabriele Costa, Silvio Ranise:
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols. ETAA@ESORICS 2019: 138-155 - 2018
- Michael Blondin
, Javier Esparza
, Stefan Jaax
:
Peregrine: A Tool for the Analysis of Population Protocols. CAV (1) 2018: 604-611 - Md Mushfiqur Rahman, Yu Lei, Georgios Kalantzis:
QALMA: A computational toolkit for the analysis of quality protocols for medical linear accelerators in radiation therapy. SoftwareX 7: 101-106 (2018) - 2017
- Juan Pedro Dominguez-Morales
, Angel Jiménez-Fernandez, Saturnino Vicente Diaz
, Alejandro Linares-Barranco
, Asuncion Olmo-Sevilla, Antonio Fernandez-Enriquez:
A Protocol Generator Tool for Automatic In-Vitro HPV Robotic Analysis. ROBOT (2) 2017: 580-591 - 2016
- Manish Sud, Eoin Fahy, Dawn Cotter, Kenan Azam, Ilango Vadivelu, Charles F. Burant
, Arthur Edison
, Oliver Fiehn, Richard M. Higashi, K. Sreekumaran Nair, Susan Sumner
, Shankar Subramaniam:
Metabolomics Workbench: An international repository for metabolomics data and metadata, metabolite standards, protocols, tutorials and training, and analysis tools. Nucleic Acids Res. 44(Database-Issue): 463-470 (2016) - Morgan Abily, Nathalie Bertrand, Olivier Delestre, Philippe Gourbesville, Y. Richet, Claire-Marie Duluc:
Global sensitivity analysis with 2d hydraulic codes: applied protocol and practical tool. CoRR abs/1603.07919 (2016) - 2015
- Ahyoung Lee, Ilkyeun Ra:
Performance analysis of ad hoc routing protocols based on selective forwarding node algorithms. Multim. Tools Appl. 74(16): 6443-6452 (2015) - Wei Si, Morteza Hashemi, Liangxiao Xin, David Starobinski, Ari Trachtenberg:
TeaCP: A Toolkit for Evaluation and Analysis of Collection Protocols in Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 12(2): 293-307 (2015) - Yong-Suk Park, Se-Ho Park, Kyung-Taek Lee, Myung-Hyun Yoon:
DLNA protocol analysis tool for smart device interoperability test. ICOIN 2015: 464-465 - 2014
- Se-Ho Park, Yong-Suk Park, Jeong-Wook Seo, Jun Rim Choi:
DLNA Protocol Inspection Tool for Compatibility Analysis. KSII Trans. Internet Inf. Syst. 8(6): 2104-2117 (2014) - Camilo Rocha
, José Meseguer:
Mechanical Analysis of Reliable Communication in the Alternating Bit Protocol Using the Maude Invariant Analyzer Tool. Specification, Algebra, and Software 2014: 603-629 - Ming-Hung Wang, Chia-Ming Yu, Chia-Liang Lin, Chien-Chao Tseng, Li-Hsing Yen:
KPAT: A kernel and protocol analysis tool for embedded networking devices. ICC 2014: 1160-1165 - 2013
- Tapio Levä, Henna Suomi:
Techno-economic feasibility analysis of Internet protocols: Framework and tools. Comput. Stand. Interfaces 36(1): 76-88 (2013) - 2011
- Nazmus Saquib, Md. Sabbir Rahman Sakib, Al-Sakib Khan Pathan
:
ViSim: A user-friendly graphical simulation tool for performance analysis of MANET routing protocols. Math. Comput. Model. 53(11-12): 2204-2218 (2011) - S. Rajesh Bansode, Vikas Kaul, P. Bhushankumar Nemade, Manoj Yadav, Swati Singh, Ashutosh Singh:
Network traffic monitoring using protocol analysis tool to achieve QoS. ICWET 2011: 1369-1370 - Michael Slavik, Imad Mahgoub, Monika Rathod:
Statistical broadcast protocol design with WiBDAT: Wireless Broadcast design and analysis tool. WCNC 2011: 1236-1241 - 2010
- Nitish Dalal, Jenny Shah, Khushboo Hisaria, Devesh Jinwala:
A Comparative Analysis of Tools for Verification of Security Protocols. Int. J. Commun. Netw. Syst. Sci. 3(10): 779-787 (2010) - Reema Patel
, Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Muttukrishnan Rajarajan, Andrea Zisman:
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. CNSA 2010: 152-163 - Juha Sääskilahti, Mikko Särelä:
Risk analysis of host identity protocol: using risk Identification Method based on Value Chain Dynamics Toolkit. ECSA Companion Volume 2010: 213-220 - 2009
- Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante
, Riccardo Sisto
, Adriano Valenzano:
Tools for cryptographic protocols analysis: A technical and experimental comparison. Comput. Stand. Interfaces 31(5): 954-961 (2009) - Ansgar Fehnker
, Matthias Fruth, Annabelle McIver
:
Graphical Modelling for Simulation and Formal Analysis of Wireless Network Protocols. Methods, Models and Tools for Fault Tolerance 2009: 1-24 - Nazmus Saquib, Md. Sabbir Rahman Sakib, Al-Sakib Khan Pathan:
Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool. CoRR abs/0911.2620 (2009) - 2008
- Somsak Vanit-Anunchai, Jonathan Billington, Guy Edward Gallasch:
Analysis of the Datagram Congestion Control Protocol's connection management procedures using the sweep-line method. Int. J. Softw. Tools Technol. Transf. 10(1): 29-56 (2008) - Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. CAV 2008: 419-422 - Cas J. F. Cremers:
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. CAV 2008: 414-418 - 2007
- María-del-Mar Gallardo, Jesús Martínez, Pedro Merino
, Pablo Núñez, Ernesto Pimentel
:
PiXL: Applying xml standards to support the integration of analysis tools for protocols. Sci. Comput. Program. 65(1): 57-69 (2007) - Joel M. Esposito, Moonzoo Kim:
Using Formal Modeling With an Automated Analysis Tool to Design and Parametrically Analyze a Multirobot Coordination Protocol: A Case Study. IEEE Trans. Syst. Man Cybern. Part A 37(3): 285-297 (2007)
skipping 16 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-01-27 03:23 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint