Sciweavers

1123 search results - page 194 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
15 years 4 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
IPPS
1999
IEEE
15 years 8 months ago
Implementation of a Virtual Time Synchronizer for Distributed Databases
The availability of high speed networks and improved microprocessor performance have made it possible to build inexpensive cluster of workstations as an appealing platform for par...
Azzedine Boukerche, Sajal K. Das, Ajoy Kumar Datta...
TLDI
2009
ACM
142views Formal Methods» more  TLDI 2009»
16 years 28 days ago
Static extraction of sound hierarchical runtime object graphs
For many object-oriented systems, it is often useful to have a runtime architecture that shows networks of communicating objects. But it is hard to statically extract runtime obje...
Marwan Abi-Antoun, Jonathan Aldrich
SWS
2004
ACM
15 years 9 months ago
Creating non-decomposable stream bundles in multimedia web services using uSMIL
Technical advances in networks, operating systems and web based services are enabling new web-based services such as audiovisual surveillance, monitoring and recording of unfoldin...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
IUI
2005
ACM
15 years 9 months ago
Designing interfaces for guided collection of knowledge about everyday objects from volunteers
A new generation of intelligent applications can be enabled by broad-coverage knowledge repositories about everyday objects. We distill lessons in design of intelligent user inter...
Timothy Chklovski