Sciweavers

1123 search results - page 152 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ICMCS
2007
IEEE
128views Multimedia» more  ICMCS 2007»
15 years 10 months ago
P2P Video Live Streaming with MDC: Providing Incentives for Redistribution
In this paper, we consider applying multiple description coding in data-driven P2P live streaming networks to provide incentives for redistribution. In our system, a video is enco...
Zhengye Liu, Yanming Shen, Shivendra S. Panwar, Ke...
ACSAC
2000
IEEE
15 years 9 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
FOSSACS
2008
Springer
15 years 6 months ago
Robust Analysis of Timed Automata via Channel Machines
Whereas formal verification of timed systems has become a very active field of research, the idealised mathematical semantics of timed automata cannot be faithfully implemented. Se...
Patricia Bouyer, Nicolas Markey, Pierre-Alain Reyn...
ACSAC
2006
IEEE
15 years 8 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
EUROMICRO
2009
IEEE
15 years 8 months ago
Service Redundancy Strategies in Service-Oriented Architectures
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Nicholas R. May, Heinz W. Schmidt, Ian E. Thomas