Sciweavers

2162 search results - page 48 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
FORTE
2007
13 years 10 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
WICON
2008
13 years 10 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
BMCBI
2010
208views more  BMCBI 2010»
13 years 8 months ago
Using machine learning to speed up manual image annotation: application to a 3D imaging protocol for measuring single cell gene
Background: Image analysis is an essential component in many biological experiments that study gene expression, cell cycle progression, and protein localization. A protocol for tr...
Zafer Aydin, John I. Murray, Robert H. Waterston, ...
ARTMED
2006
158views more  ARTMED 2006»
13 years 8 months ago
CareVis: Integrated visualization of computerized protocols and temporal patient data
Objective: Currently, visualization support for patient data analysis is mostly limited to the representation of directly measured data. Contextual information on performed treatm...
Wolfgang Aigner, Silvia Miksch
IACR
2011
87views more  IACR 2011»
12 years 8 months ago
Untangling RFID Privacy Models
This article investigates privacy in Radio Frequency IDentification (RFID) systems. We survey the eight most well-known RFID privacy models. We examine their advantages and drawba...
Iwen Coisel, Tania Martin