Sciweavers

3972 search results - page 196 / 795
» Design of the iSCSI Protocol
Sort
View
INFOCOM
2002
IEEE
15 years 9 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
INFOCOM
2000
IEEE
15 years 9 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
SIGSOFT
2000
ACM
15 years 9 months ago
Compiler and tool support for debugging object protocols
We describe an extension to the Java programming language that supports static conformance checking and dynamic debugging of object "protocols," i.e., sequencing constra...
Sergey Butkevich, Marco Renedo, Gerald Baumgartner...
ICMCS
1999
IEEE
89views Multimedia» more  ICMCS 1999»
15 years 8 months ago
A Lightweight Protocol for Interconnecting Heterogeneous Devices in Dynamic Environments
In the near future people will be able to move freely and still have seamless network and Internet connectivity. One implication of this new style of interaction is an increased d...
Kevin C. Almeroth, Katia Obraczka, Dante DeLucia
RTAS
1999
IEEE
15 years 8 months ago
MIRROR: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases
Data replication can help database systems meet the stringent temporal constraints of current time-critical applications, especially Internet-based services. A prerequisite, howev...
Ming Xiong, Krithi Ramamritham, Jayant R. Haritsa,...