Sciweavers

416 search results - page 37 / 84
» Modular network trace analysis
Sort
View
CCS
2008
ACM
13 years 11 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
SIGCOMM
2012
ACM
11 years 11 months ago
Reduction-based analysis of BGP systems with BGPVerif
Today’s inter-domain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfiguration by individual autonomous system...
Anduo Wang, Alexander J. T. Gurney, Xianglong Han,...
ESM
2000
13 years 10 months ago
A tool for controlled knowledge discovery in spatial domains
A data simulator that can facilitate the development of improved sampling and analysis procedures for spatial analysis is proposed. The simulator, implemented in MATLAB, provides ...
Dragoljub Pokrajac, Zoran Obradovic, Tim Fiez
HIPC
2003
Springer
14 years 2 months ago
Performance Analysis of Blue Gene/L Using Parallel Discrete Event Simulation
High performance computers currently under construction, such as IBM’s Blue Gene/L, consisting of large numbers (64K) of low cost processing elements with relatively small local...
Ed Upchurch, Paul L. Springer, Maciej Brodowicz, S...
IMC
2010
ACM
13 years 7 months ago
Characterizing radio resource allocation for 3G networks
3G cellular data networks have recently witnessed explosive growth. In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. Our work is the f...
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoq...