Sciweavers

295 search results - page 22 / 59
» Differentially-private network trace analysis
Sort
View
VAMOS
2007
Springer
14 years 4 months ago
Using Goal-Models to Analyze Variability
On our ongoing research on variability analysis, two major drawbacks have been identified: a) the lack of an effective tracing from the rationale to the selected variant, and b) t...
Bruno González-Baixauli, Miguel A. Laguna, ...
GLOBECOM
2006
IEEE
14 years 4 months ago
Defending against Instant Messaging Worms
— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Zhijun Liu, Guoqiang Shu, Na Li, David Lee
CCS
2008
ACM
14 years 2 days ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
SIGCOMM
2012
ACM
12 years 16 days ago
Reduction-based analysis of BGP systems with BGPVerif
Today’s inter-domain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfiguration by individual autonomous system...
Anduo Wang, Alexander J. T. Gurney, Xianglong Han,...
HIPC
2003
Springer
14 years 3 months ago
Performance Analysis of Blue Gene/L Using Parallel Discrete Event Simulation
High performance computers currently under construction, such as IBM’s Blue Gene/L, consisting of large numbers (64K) of low cost processing elements with relatively small local...
Ed Upchurch, Paul L. Springer, Maciej Brodowicz, S...