Sciweavers

2699 search results - page 62 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ESEM
2009
ACM
14 years 3 months ago
Progress report on the experimental evaluation of security inspection guidance
Although security inspections have proven to be a very efficient means for assuring software security early in the software development lifecycle, they are not used extensively be...
Frank Elberzhager, Marek Jawurek, Christian Jung, ...
RTAS
1996
IEEE
14 years 1 months ago
Evaluation of Wireless Soft Real-Time Protocols
Communication between current military real-time systems and future interconnection of general purpose, embedded real-time systems will often require wireless communications. Howe...
Michael J. Markowski, Adarshpal S. Sethi
ISPA
2004
Springer
14 years 2 months ago
A Fault Tolerance Protocol for Uploads: Design and Evaluation
This paper investigates fault tolerance issues in Bistro, a wide area upload architecture. In Bistro, clients first upload their data to intermediaries, known as bistros. A destin...
Leslie Cheung, Cheng-Fu Chou, Leana Golubchik, Yan...
WSC
2007
13 years 11 months ago
Using event simulation to evaluate internet protocol enhancements for special services
Disasters can cause extraordinary service demand by the public, while concurrently causing outages that reduce network capacity to serve the surging demand. It is imperative that ...
David A. Garbin, Patrick V. McGregor, Denise M. Be...
USITS
2003
13 years 10 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen