Sciweavers

127 search results - page 4 / 26
» A Generalization of DDH with Applications to Protocol Analys...
Sort
View
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
14 years 22 days ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
PEWASUN
2007
ACM
13 years 8 months ago
Analysis of the impact of hello protocol parameters over a wireless network self-organization
The neighborhood discovery and its maintenance are very important in wireless networks for any applications, especially for routing and every self-∗ algorithm. Neighbor nodes ar...
Tahiry Razafindralambo, Nathalie Mitton
INFOCOM
2006
IEEE
14 years 1 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
DAC
2007
ACM
13 years 11 months ago
Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application
In this paper, we describe several experiments designed to characterize jitter in an actual automotive application designed using FlexCAN, a CAN based communication architecture. ...
Juan R. Pimentel, Jason Paskvan