Sciweavers

472 search results - page 29 / 95
» The Case for Informed Transport Protocols
Sort
View
ICCCN
1998
IEEE
13 years 12 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
IPPS
1998
IEEE
13 years 12 months ago
Update Protocols and Iterative Scientific Applications
Software DSMs have been a research topic for over a decade. While good performance has been achieved in some cases, consistent performance has continued to elude researchers. This...
Peter J. Keleher
WCRE
2007
IEEE
14 years 1 months ago
Dynamic Protocol Recovery
Dynamic protocol recovery tries to recover a component’s sequencing constraints by means of dynamic analysis. This problem has been tackled by several automaton learning approac...
Jochen Quante, Rainer Koschke
ACMSE
2004
ACM
14 years 1 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
14 years 29 days ago
Strategies for the Successful Implementation of Workflow Systems within Healthcare: A Cross Case Comparison
The implementation of computerized workflow systems to support the collection and dissemination of patient information has been an area of focus in healthcare for many years. This...
Meg Murray