Sciweavers

4305 search results - page 183 / 861
» Analysing Protocol Implementations
Sort
View
LCN
2005
IEEE
14 years 2 months ago
An Advanced QoS Protocol for Mass Content
This paper describes a new network device to be located in network edge nodes. The device can deal with congestion conditions that may arise when, for example, a home or SME custo...
Thomas Dreibholz, Avril IJsselmuiden, John L. Adam...
IDEAS
1999
IEEE
166views Database» more  IDEAS 1999»
14 years 1 months ago
Recovery Protocols in Multi-Agent Probabilistic Reasoning Systems
In this paper, we introduce a probabilistic relational data model as the basis for developing multi-agent probabilistic reasoning systems. Since our model subsumes the traditional...
Cory J. Butz, S. K. Michael Wong
CMS
2006
110views Communications» more  CMS 2006»
13 years 10 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
FORTE
1998
13 years 10 months ago
Exploiting Symmetry in Protocol Testing
Test generation and execution are often hampered by the large state spaces of the systems involved. In automata (or transition system) based test algorithms, taking advantage of s...
Judi Romijn, Jan Springintveld
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 9 months ago
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many pot...
Siva Rama Krishnan Somayaji, Ch. A. S. Murty