Sciweavers

123 search results - page 14 / 25
» Abstracting out Byzantine Behavior
Sort
View
ICC
2007
IEEE
14 years 1 months ago
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska
BIRTHDAY
2005
Springer
14 years 1 months ago
Finite Equational Bases in Process Algebra: Results and Open Questions
Abstract. Van Glabbeek (1990) presented the linear time/branching time spectrum of behavioral equivalences for finitely branching, concrete, sequential processes. He studied these...
Luca Aceto, Wan Fokkink, Anna Ingólfsd&oacu...
ISW
2005
Springer
14 years 1 months ago
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
Zhenghong Wang, Ruby B. Lee
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
14 years 1 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke
GFKL
2004
Springer
132views Data Mining» more  GFKL 2004»
14 years 1 months ago
Reservation Price Estimation by Adaptive Conjoint Analysis
Abstract. Though reservation prices are needed for many business decision processes, e.g., pricing new products, it often turns out to be difficult to measure them. Many researcher...
Christoph Breidert, Michael Hahsler, Lars Schmidt-...