Sciweavers

177 search results - page 10 / 36
» Reasoning About Active Network Protocols
Sort
View
ICANN
2007
Springer
14 years 2 months ago
Towards Understanding of Natural Language: Neurocognitive Inspirations
Neurocognitive processes responsible for representation of meaning and understanding of words are investigated. First a review of current knowledge about word representation, recen...
Wlodzislaw Duch, Pawel Matykiewicz, John Pestian
DSN
2003
IEEE
14 years 1 months ago
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries
This paper presents a formal model for asynchronous distributed systems with servers that may exhibit Byzantine faults or crash and subsequently recover. The model is computationa...
Michael Backes, Christian Cachin
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
WS
2005
ACM
14 years 2 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 3 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...