Sciweavers

1875 search results - page 27 / 375
» Automatic Network Protocol Analysis
Sort
View
INFOCOM
2006
IEEE
14 years 4 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
AINA
2007
IEEE
14 years 4 months ago
Recovery Protocols for Replicated Databases - A Survey
The main goal of replication is to increase dependability. Recovery protocols are a critical building block for realizing this goal. In this survey, we present an analysis of reco...
Luis H. García-Muñoz, José En...
QEST
2009
IEEE
14 years 4 months ago
Mean-Field Analysis for the Evaluation of Gossip Protocols
—Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial...
Rena Bakhshi, Lucia Cloth, Wan Fokkink, Boudewijn ...
AINA
2007
IEEE
14 years 4 months ago
Power and Delay Analysis of The WEAC Protocol Based MANET Under Video Transport
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Hafiz M. Asif, Tarek R. Sheltami
INFOCOM
2006
IEEE
14 years 4 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne