Sciweavers

57 search results - page 7 / 12
» Exploiting Symmetry in Protocol Testing
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 5 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
INFOCOM
2006
IEEE
14 years 4 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
BROADNETS
2007
IEEE
14 years 5 months ago
Retransmission in OBS networks with fiber delay lines
— While most transmission schemes in OBS networks relegate retransmission to higher protocol layers, the scheme proposed in this paper reduces retransmission delays by exploiting ...
Kyung Joon Kwak, Edward G. Coffman Jr.
COLING
2010
13 years 5 months ago
Building Systematic Reviews Using Automatic Text Classification Techniques
The amount of information in medical publications continues to increase at a tremendous rate. Systematic reviews help to process this growing body of information. They are fundame...
Oana Frunza, Diana Inkpen, Stan Matwin
QSHINE
2009
IEEE
14 years 5 months ago
Cooperative Training in Wireless Sensor and Actor Networks
Exploiting features of high density wireless sensor networks represents a challenging issue. In this work, the training of a sensor network which consists of anonymous and asynchro...
Francesco Betti Sorbelli, Roberto Ciotti, Alfredo ...