Specifications for an Application Protocol Development Environment

نویسندگان

  • Stephen Nowland Clark
  • Allison Barnard Feeney
  • James E. Fowler
چکیده

2 AP Development Process .................................................................2 2.1 AP Project Definition...................................................................................2 2.2 AP Information Requirements .....................................................................4 2.3 AP Interpretation..........................................................................................4 2.4 Complete AP................................................................................................5

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

Constructing Mid-Points for Two-Party Asynchronous Protocols

Communication protocols describe the steps that the communication end-points must take in order to achieve a common goal. In practice, networks often contain mid-points, which can relay, redirect, or filter messages exchanged by the end-points. A mid-point can enforce a communication protocol: it forwards the messages that conform to the protocol, and drops them otherwise. Protocol specificatio...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Tools for Generating Application-Tailored Multimedia Protocols on Heterogeneous Multi-Processor Platforms

This paper describes an integrated set of tools for generating application-tailored communication protocol machines. In addition to simplifying the process of generating protocols by automatingcertain development steps, these tools also facilitate the mapping of platform-independent protocol machines onto several types of multi-processor end-system architectures. An overview of the steps used t...

متن کامل

Interaction Interfaces - Towards a Scientific Foundation of a Methodological Usage of Message Sequence Charts

We introduce the formal notion of an interaction interface. Its purpose is to specify formally the interaction between two or more components that co-operate as subsystems of a distributed system. We suggest the use of interaction interfaces for the description not of the behaviour of a single component in isolation but of the interface, the co-operation, between two or more components that are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002