Sciweavers

255 search results - page 13 / 51
» A Multiphased Approach for Modeling and Analysis of the BitT...
Sort
View
TOSEM
2010
168views more  TOSEM 2010»
13 years 2 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
IWIA
2003
IEEE
14 years 27 days ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
JOT
2010
96views more  JOT 2010»
13 years 6 months ago
UML Profiles for Modeling Real-Time Communication Protocols
Validation of non-functional and functional properties of these protocols during the early stages of design and development is important to reduce cost resulting from protocol ano...
Barath Kumar, Jürgen Jasperneite
CASCON
1996
99views Education» more  CASCON 1996»
13 years 9 months ago
Modeling and analysis of the Unix communication subsystems
The performance of host communication subsystems is an important research topic in computer networks.1 Performance metrics such as throughput, delay, and packet loss are important...
Yi-Chun Chu, Toby J. Teorey