One of the most fundamental forms of cooperation in any network is the cooperation between network nodes for routing and the subsequent context dissemination. To do so each node runs an instance of a routing process relying, in many cases, only on partial network information rather than network-wide information. This can lead to instabilities and problematic situations, such as deadlocks or livelocks. Deadlock is a condition where a process stalls; meaning it reaches a state from which there is no exit action. When it comes to routing this would mean the condition where a packet reaches a node and is not forwarded any further because the routing process has reached a state which was not taken into account in its behavioural specification. L...
Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of ...
We present a formal development in Event-B of a distributed topology discovery algorithm. Distribute...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
The use of wireless networks has been on the rise for some time now, from the ubiquitous smart phone...
The task of a routing protocol is to discover and maintain paths between distant points in a network...
We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up ...
Network protocol construction is a complex and error prone task. The challenges originate both from...
In this paper a universal model for breaking cycles is described. A method applicable to nondirected...
Wormhole switching is a popular switching technique in interconnection networks. This technique is a...
In this thesis, we study the behavior of routing protocols in production environments. Routing proto...
International audienceA fault-tolerant routing algorithm in Network-on-Chip (NoC) architectures prov...
We propose a new approach to modelling and reasoning about dynamic networks. Dynamic networks consis...
Many cryptographic protocols aim at ensuring the route validity in ad-hoc networks, i.e. the establi...
Routing data packets in a dynamic network is a difficult and important problem in computer networks....
We investigate the impact of node and communication failures on the decidability and complexity of p...
Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of ...
We present a formal development in Event-B of a distributed topology discovery algorithm. Distribute...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
The use of wireless networks has been on the rise for some time now, from the ubiquitous smart phone...
The task of a routing protocol is to discover and maintain paths between distant points in a network...
We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up ...
Network protocol construction is a complex and error prone task. The challenges originate both from...
In this paper a universal model for breaking cycles is described. A method applicable to nondirected...
Wormhole switching is a popular switching technique in interconnection networks. This technique is a...
In this thesis, we study the behavior of routing protocols in production environments. Routing proto...
International audienceA fault-tolerant routing algorithm in Network-on-Chip (NoC) architectures prov...
We propose a new approach to modelling and reasoning about dynamic networks. Dynamic networks consis...
Many cryptographic protocols aim at ensuring the route validity in ad-hoc networks, i.e. the establi...
Routing data packets in a dynamic network is a difficult and important problem in computer networks....
We investigate the impact of node and communication failures on the decidability and complexity of p...
Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of ...
We present a formal development in Event-B of a distributed topology discovery algorithm. Distribute...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...