Sciweavers

416 search results - page 19 / 84
» Modular network trace analysis
Sort
View
LOPSTR
2001
Springer
14 years 1 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 8 months ago
Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis
Abstract--Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose...
Sungwook Moon, Ahmed Helmy
CASES
2006
ACM
14 years 3 months ago
A network agent for diagnosis and analysis of real-time Ethernet networks
Within the field of automation technology the use of Industrial Ethernet is rising. This in turn demands devices capable of precisely recording, analyzing, and manipulating commu...
Hans-Peter Löb, Rainer Buchty, Wolfgang Karl
SIGCOMM
2004
ACM
14 years 2 months ago
Modeling and performance analysis of BitTorrent-like peer-to-peer networks
In this paper, we develop simple models to study the performance of BitTorrent, a second generation peer-to-peer (P2P) application. We first present a simple fluid model and stu...
Dongyu Qiu, Rayadurgam Srikant
AAIM
2007
Springer
118views Algorithms» more  AAIM 2007»
14 years 1 months ago
Significance-Driven Graph Clustering
Abstract. Modularity, the recently defined quality measure for clusterings, has attained instant popularity in the fields of social and natural sciences. We revisit the rationale b...
Marco Gaertler, Robert Görke, Dorothea Wagner