Sciweavers

54 search results - page 4 / 11
» On Inferring Application Protocol Behaviors in Encrypted Net...
Sort
View
CP
2006
Springer
13 years 11 months ago
Constraint Based Resilience Analysis
Abstract. In this paper we give an overview of applications of Constraint Programming for IP (Internet Protocol) data networks, and discuss the problem of Resilience Analysis in mo...
Helmut Simonis
MOBIHOC
2008
ACM
14 years 7 months ago
On the need for bidirectional coupling of road traffic microsimulation and network simulation
Simulation of network protocol behavior in Vehicular Ad Hoc Network (VANET) scenarios is strongly demanded for evaluating the applicability of developed network protocols. In this...
Christoph Sommer, Zheng Yao, Reinhard German, Falk...
DSN
2007
IEEE
13 years 11 months ago
Bounding Peer-to-Peer Upload Traffic in Client Networks
Peer-to-peer technique has now become one of the major techniques to exchange digital content between peers of the same interest. However, as the amount of peer-topeer traffic inc...
Chun-Ying Huang, Chin-Laung Lei
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
14 years 28 days ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
TROB
2008
113views more  TROB 2008»
13 years 7 months ago
Occam's Razor Applied to Network Topology Inference
We present a method for inferring the topology of a sensor network given nondiscriminating observations of activity in the monitored region. This is accomplished based on no prior ...
Dimitri Marinakis, Gregory Dudek