Sciweavers

4305 search results - page 54 / 861
» Analysing Protocol Implementations
Sort
View
ICNC
2005
Springer
14 years 2 months ago
An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending
In this paper, we review a visual approach and propose it for analysing computer-network activity, which is based on the use of unsupervised connectionist neural network models and...
Álvaro Herrero, Emilio Corchado, José...
MEMOCODE
2005
IEEE
14 years 2 months ago
Automatic synthesis of cache-coherence protocol processors using Bluespec
There are few published examples of the proof of correctness of a cache-coherence protocol expressed in an HDL. A designer generally shows the correctness of a protocol ny impleme...
Nirav Dave, Man Cheuk Ng, Arvind
INFOCOM
1999
IEEE
14 years 1 months ago
The ENTRAPID Protocol Development Environment
As Internet services rapidly become an essential part of the global infrastructure, it is necessary for the protocols underlying these services to be robust and failsafe. To achiev...
X. W. Huang, Rosen Sharma, Srinivasan Keshav
EUROSYS
2009
ACM
14 years 6 months ago
Dingo: taming device drivers
Device drivers are notorious for being a major source of failure in operating systems. In analysing a sample of real defects in Linux drivers, we found that a large proportion (39...
Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heise...
WMI
2001
114views more  WMI 2001»
13 years 10 months ago
A scalable, distributed middleware service architecture to support mobile internet applications
Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying pla...
Thomas Phan, Richard G. Guy, Rajive Bagrodia