Sciweavers

2162 search results - page 150 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ICC
2007
IEEE
14 years 4 months ago
On the Impact of Ignoring Markovian Channel Memory on the Analysis of Wireless Systems
– Recent wireless measurement studies have revealed the presence of high-order memory in wireless bit-error channels. However, most wireless studies continue to employ the memory...
Syed A. Khayam, Hayder Radha
WDAG
2007
Springer
63views Algorithms» more  WDAG 2007»
14 years 4 months ago
A Formal Analysis of the Deferred Update Technique
The deferred update technique is a widely used approach for building replicated database systems. Its fame stems from the fact that read-only transactions can execute locally to a...
Rodrigo Schmidt, Fernando Pedone
IMC
2006
ACM
14 years 4 months ago
binpac: a yacc for writing application protocol parsers
A key step in the semantic analysis of network traffic is to parse the traffic stream according to the high-level protocols it contains. This process transforms raw bytes into s...
Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. ...
COMCOM
2002
189views more  COMCOM 2002»
13 years 10 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
SECON
2010
IEEE
13 years 8 months ago
Traffic Inference in Anonymous MANETs
Abstract--The open wireless medium in a mobile ad-hoc network (MANET) enables malicious traffic analysis to dynamically infer the network traffic pattern in hostile environments. T...
Yunzhong Liu, Rui Zhang, Jing Shi, Yanchao Zhang