Sciweavers

623 search results - page 72 / 125
» Declarative Network Verification
Sort
View
NETWORKING
2008
13 years 10 months ago
Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing
Currently emerging standard routing protocols for MANETs do not perform well in presence of malicious nodes that intentionally drop data traffic but otherwise behave correctly with...
Ignacy Gawedzki, Khaldoun Al Agha
NSDI
2004
13 years 10 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
QSHINE
2009
IEEE
14 years 3 months ago
Credit-Token Based Inter-cell Radio Resource Management: A Game Theoretic Approach
Abstract. In this paper, a radio resource sharing scheme for wireless cellular network is investigated to achieve efficiency and fairness among base stations. We propose a credit-t...
Chun-Han Ko, Hung-Yu Wei
NETCOOP
2007
Springer
14 years 2 months ago
Pricing for QoS Provisioning Across Multiple Internet Service Provider Domains
In this paper we introduce a pricing scheme to be employed between a group of Internet service providers (ISPs) and a customer who wishes to initiate a packet flow from a fixed o...
Soheil Saberi, Roland P. Malhamé, Lorne Mas...
POLICY
2001
Springer
14 years 1 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...