In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Wireless ad hoc networks consist of hundreds to thousands of mobile nodes that are powered by batteries. To prolong the network operational time, energy conservation in such netwo...
The query models of the recent generation of very large scale distributed (VLSD) shared-nothing data storage systems, including our own PNUTS and others (e.g. BigTable, Dynamo, Ca...
Parag Agrawal, Adam Silberstein, Brian F. Cooper, ...
—The first HSDPA (High-Speed Downlink Packet Access) networks have been recently deployed for operational use. We evaluate and compare live HSDPA operational network performance ...
Marko Jurvansuu, Jarmo Prokkola, Mikko Hanski, Pek...