Sciweavers

506 search results - page 35 / 102
» Network Engineering for Complex Belief Networks
Sort
View
ISSTA
2000
ACM
14 years 1 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
KBSE
2006
IEEE
14 years 2 months ago
Accurate Centralization for Applying Model Checking on Networked Applications
Software model checkers can be applied directly to single-process programs, which typically are multithreaded. Multi-process applications cannot be model checked directly. While m...
Cyrille Artho, Pierre-Loïc Garoche
TACS
2001
Springer
14 years 1 months ago
The UDP Calculus: Rigorous Semantics for Real Networking
Network programming is notoriously hard to understand: one has to deal with a variety of protocols (IP, ICMP, UDP, TCP etc), concurrency, packet loss, host failure, timeouts, the c...
Andrei Serjantov, Peter Sewell, Keith Wansbrough
ISPASS
2009
IEEE
14 years 3 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
ICC
2007
IEEE
171views Communications» more  ICC 2007»
14 years 3 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan