Sciweavers

1995 search results - page 319 / 399
» From Data Flow Networks to Process Algebras
Sort
View
RAID
2005
Springer
15 years 10 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
WS
2004
ACM
15 years 10 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
ECAI
2004
Springer
15 years 9 months ago
Using Constraints with Memory to Implement Variable Elimination
Abstract. Adaptive consistency is a solving algorithm for constraint networks. Its basic step is variable elimination: it takes a network as input, and producesan equivalent networ...
Martí Sánchez, Pedro Meseguer, Javie...
SIGMETRICS
2010
ACM
180views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Route oracle: where have all the packets gone?
Many network-management problems in large backbone networks need the answer to a seemingly simple question: where does a given IP packet, entering the network at a particular plac...
Yaping Zhu, Jennifer Rexford, Subhabrata Sen, Aman...
CSB
2003
IEEE
15 years 9 months ago
Initial Large-scale Exploration of Protein-protein Interactions in Human Brain
Study of protein interaction networks is crucial to post-genomic systems biology. Aided by highthroughput screening technologies, biologists are rapidly accumulating protein-prote...
Jake Yue Chen, Andrey Y. Sivachenko, Russell Bell,...