Sciweavers

1466 search results - page 175 / 294
» Completeness of the Authentication Tests
Sort
View
134
Voted
ICNP
2006
IEEE
15 years 9 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
118
Voted
CIBCB
2005
IEEE
15 years 9 months ago
An Internet-based Melanoma Diagnostic System - Toward the Practical Application
— In this paper, we report a practical application of world’s first internet-based melanoma diagnostic system. The system is now available from all over the world, 24 hours 36...
Hitoshi Iyatomi, Hiroshi Oka, Masahiro Hashimoto, ...
142
Voted
IMC
2005
ACM
15 years 9 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
140
Voted
PAM
2005
Springer
15 years 9 months ago
Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links
In this paper we present results of a series of bandwidth estimation experiments conducted on a high-speed testbed at the San Diego Supercomputer Center and on OC-48 and GigE paths...
Alok Shriram, Margaret Murray, Young Hyun, Nevil B...
132
Voted
TLCA
2005
Springer
15 years 9 months ago
Avoiding Equivariance in Alpha-Prolog
αProlog is a logic programming language which is well-suited for rapid prototyping of type systems and operational semantics of typed λ-calculi and many other languages involving...
Christian Urban, James Cheney