Sciweavers

1144 search results - page 12 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
USS
2010
13 years 5 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
WSC
1996
13 years 9 months ago
Scalable simulation models for construction operations
Construction operations are often repetitive not only in terms of time (the same tasks are performed over and over) but also in terms of space (the same tasks are repeated at seve...
Photios G. Ioannou, Julio C. Martínez
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
14 years 1 months ago
Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection
Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability ...
Thomas M. Galla, Karin Anna Hummel, Burkhard Peer
COMPSAC
2009
IEEE
14 years 2 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...
FCCM
2003
IEEE
185views VLSI» more  FCCM 2003»
14 years 29 days ago
Implementation of a Content-Scanning Module for an Internet Firewall
A module has been implemented in Field Programmable Gate Array (FPGA) hardware that scans the content of Internet packets at Gigabit/second rates. All of the packet processing ope...
James Moscola, John W. Lockwood, Ronald Prescott L...