Sciweavers

1875 search results - page 335 / 375
» Automatic Network Protocol Analysis
Sort
View
SCP
2000
119views more  SCP 2000»
13 years 8 months ago
Automated compositional Markov chain generation for a plain-old telephone system
Obtaining performance models, like Markov chains and queueing networks, for systems of significant complexity and magnitude is a difficult task that is usually tackled using human...
Holger Hermanns, Joost-Pieter Katoen
EUROSYS
2010
ACM
14 years 6 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
TC
2008
13 years 8 months ago
Improving Quality of VoIP Streams over WiMax
Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are ...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly
VTC
2010
IEEE
136views Communications» more  VTC 2010»
13 years 7 months ago
HARQ Aided Systematic LT Coding for Amplify-Forward and Decode-Forward Cooperation
—Systematic Luby Transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without explicit chan...
Hoang Anh Ngo, Thanh Dang Nguyen, Lajos Hanzo
USS
2004
13 years 10 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp