Sciweavers

2485 search results - page 89 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 3 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
CONEXT
2008
ACM
13 years 10 months ago
Towards a new generation of information-oriented internetworking architectures
In response to the limitations of the Internet architecture when used for applications for which it was not originally designed, a series of clean slate efforts have emerged to sh...
Christian Esteve, Fábio Luciano Verdi, Maur...
EUROCAST
2007
Springer
131views Hardware» more  EUROCAST 2007»
14 years 22 days ago
Efficient Model Checking of Applications with Input/Output
Most non-trivial applications use some form of input/output (I/O), such as network communication. When model checking such an application, a simple state space exploration scheme i...
Cyrille Artho, Boris Zweimüller, Armin Biere,...
ICPPW
2006
IEEE
14 years 2 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
DSOM
2009
Springer
14 years 3 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...