Systems Modeling for IP-Based Handoff Using Timed Petri Nets
暂无分享,去创建一个
Henning Schulzrinne | Jiacun Wang | Ashutosh Dutta | Bryan Lyles | H. Schulzrinne | Jiacun Wang | A. Dutta | J. B. Lyles
[1] Wlodzimierz M. Zuberek. Hierarchical analysis of manufacturing systems using Petri nets , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[2] Edna Barros,et al. Using Petri nets for data dependency analysis , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[3] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[4] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[5] David Munoz-Rodriguez,et al. Modeling resource management in cellular systems using Petri nets , 1997 .
[6] M. W.,et al. Timed Petri Nets in Modeling and Analysis of Simple Schedules for Manufacturing Cells , 2003 .
[7] Jiacun Wang,et al. Timed Petri Nets: Theory and Application , 1998 .
[8] 寺岡 文男,et al. Protocol for carrying Authentication for Network Access (PANA) を利用したネットワークアクセス認証システムの実装と検証 , 2007 .
[9] Charles E. Perkins,et al. Mobility support in IPv6 , 1996, MobiCom '96.
[10] Greg Daley,et al. Goals of Detecting Network Attachment in IPv6 , 2005, RFC.
[11] Antonio F. Gómez-Skarmeta,et al. Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[12] J. Sokol,et al. Petri net based performance evaluation of USAIA's bandwidth partitioning for the wireless cell level , 2001, Proceedings 9th International Workshop on Petri Nets and Performance Models.
[13] Kazukuni Kobara,et al. On the Impact of Security on the Latency in WLAN 802.11b: Analytical Study , 2005 .
[14] Jari Arkko,et al. Network Discovery and Selection Problem , 2008, RFC.
[15] Dan Forsberg,et al. Protocol for Carrying Authentication for Network Access (PANA) , 2008, RFC.