Sciweavers

1123 search results - page 143 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
JNW
2007
128views more  JNW 2007»
15 years 4 months ago
Store and Forward Applications in Telemedicine for Wireless IP Based Networks
— Telemedicine is the use of telecommunications technology to provide medical information and services. It may be as simple as two health professionals discussing a case over the...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
INFOCOM
2006
IEEE
15 years 10 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
SOSP
2005
ACM
16 years 1 months ago
Implementing declarative overlays
Overlay networks are used today in a variety of distributed systems ranging from file-sharing and storage systems to communication infrastructures. However, designing, building a...
Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein...
CCGRID
2010
IEEE
15 years 5 months ago
Dynamic TTL-Based Search in Unstructured Peer-to-Peer Networks
Abstract--Resource discovery is a challenging issue in unstructured peer-to-peer networks. Blind search approaches, including flooding and random walks, are the two typical algorit...
Imen Filali, Fabrice Huet
RTAS
2006
IEEE
15 years 10 months ago
Network-Code Machine: Programmable Real-Time Communication Schedules
Distributed hard real-time systems require guaranteed communication. One common approach is to restrict network access by enforcing a time-division multiple access (TDMA) schedule...
Sebastian Fischmeister, Oleg Sokolsky, Insup Lee