Sciweavers

2162 search results - page 126 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 3 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
CAV
2012
Springer
223views Hardware» more  CAV 2012»
11 years 11 months ago
Detecting Fair Non-termination in Multithreaded Programs
Abstract. We develop compositional analysis algorithms for detecting nontermination in multithreaded programs. Our analysis explores fair and ultimatelyperiodic executions—i.e., ...
Mohamed Faouzi Atig, Ahmed Bouajjani, Michael Emmi...
ESAS
2005
Springer
14 years 2 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...
AICT
2006
IEEE
14 years 20 days ago
Transfer Rate Models for Gnutella Signaling Traffic
This paper reports on transfer rate models for the Gnutella signaling protocol. New results on message-level and IP-level rates are presented. The models are based on traffic capt...
Dragos Ilie, David Erman, Adrian Popescu
AAAI
2008
13 years 11 months ago
In-the-Dark Network Traffic Classification Using Support Vector Machines
This work addresses the problem of in-the-dark traffic classification for TCP sessions, an important problem in network management. An innovative use of support vector machines (S...
William H. Turkett Jr., Andrew V. Karode, Errin W....