This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960’s until today’s more elaborate framewo...
In multiagent systems ontologies are essential because they facilitate tasks like communications and reasoning. In this paper, inspired by studies in cognitive psychology, we pres...
We present a novel protocol, M3L, for multicast tree fault isolation based purely upon end-to-end information. Here, a fault is a link with a loss rate exceeding a specified thres...
Timur Friedman, Donald F. Towsley, James F. Kurose
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Formal techniques have been widely applied in the design of real-time systems and have significantly helped detect design errors by checking real-time properties of the model. Ho...