Sciweavers

718 search results - page 131 / 144
» Operational Semantics of Security Protocols
Sort
View
DSN
2007
IEEE
14 years 2 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
SIGMETRICS
1999
ACM
14 years 3 days ago
Performance Issues in WWW Servers
—This paper evaluates techniques for improving operating system and network protocol software support for high-performance World Wide Web servers. We study approaches in three ca...
Erich M. Nahum, Tsipora P. Barzilai, Dilip D. Kand...
ECOOP
2006
Springer
13 years 11 months ago
Session Types for Object-Oriented Languages
A session takes place between two parties; after establishing a connection, each party interleaves local computations and communications (sending or receiving) with the other. Ses...
Mariangiola Dezani-Ciancaglini, Dimitris Mostrous,...
COOTS
2001
13 years 9 months ago
Kava - Using Byte code Rewriting to add Behavioural Reflection to Java
Many authors have proposed using byte code rewriting as a way of adapting or extending the behaviour of Java There are toolkits available that simplify this process and raise the ...
Ian Welch, Robert J. Stroud
IJIPT
2007
111views more  IJIPT 2007»
13 years 7 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss