Sciweavers

672 search results - page 13 / 135
» Analysis and applications of timed service protocols
Sort
View
WICON
2008
13 years 10 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
IWFM
2003
13 years 10 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
WETICE
2007
IEEE
14 years 3 months ago
A Dominating Set Based Peer-to-Peer Protocol for Real-Time Multi-source Collaboration
Designing a collaborative architecture for real-time applications is an intricate challenge that usually involves dealing with the real-time constraints, resource limitations and ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi, Abdulmo...
COOPIS
2002
IEEE
14 years 1 months ago
An Adaptive Scheduling Service for Real-Time CORBA
CORBA is an important standard middleware used in the development of distributed applications. It has also been used with distributed real-time applications, through its extension ...
Alexandre Cervieri, Rômulo Silva de Oliveira...
RTSS
1999
IEEE
14 years 1 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri