Sciweavers

352 search results - page 22 / 71
» Proof-Checking a Data Link Protocol
Sort
View
WSC
1997
13 years 9 months ago
Why We Don't Know How To Simulate the Internet
Simulating how the global Internet data network behaves is an immensely challenging undertaking because of the network’s great heterogeneity and rapid change. The heterogeneity ...
Vern Paxson, Sally Floyd
ADHOC
2011
13 years 2 days ago
QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations
—Research in wireless mesh networks have been growing in recent years. Many testbeds have been created to study networking protocols in wireless mesh networks. In this work, we d...
Daniel Wu, Dhruv Gupta, Prasant Mohapatra
EDOC
2000
IEEE
14 years 26 days ago
Wireless Java RMI
Due to its high protocol overhead, both in data traffic and in round-trips, Java RMI is poorly suited for communication over slow wireless links. However, its performance can be ...
Stefano Campadello, Oskari Koskimies, Kimmo E. E. ...
ACSAC
2005
IEEE
14 years 2 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 8 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov