Sciweavers

672 search results - page 66 / 135
» A compiler-based communication analysis approach for multipr...
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
ICCCN
2007
IEEE
14 years 3 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ISSTA
2009
ACM
14 years 3 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
SIGCOMM
2010
ACM
13 years 9 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
CUZA
2002
132views more  CUZA 2002»
13 years 8 months ago
A Process Algebra for Predictible Control Systems
This paper presents Process Algebra for Predictible Control Systems (PAPCS) as a model for specifying and analysis of concurrent, time and resource dependent, distributed control s...
Nicolae Marian