Sciweavers

741 search results - page 80 / 149
» Tools and techniques for Network Forensics
Sort
View
EMSOFT
2004
Springer
14 years 2 months ago
Loose synchronization of event-triggered networks for distribution of synchronous programs
Dataflow synchronous languages have attracted considerable interest in domains such as real-time control and hardware design. The potential benefits are promising: Discrete-time...
Jan Romberg, Andreas Bauer 0002
PST
2004
13 years 10 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
IANDC
2008
128views more  IANDC 2008»
13 years 9 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
QOFIS
2004
Springer
14 years 2 months ago
Charging for Web Content Pre-fetching in 3G Networks
Abstract. Web pre-fetching is a technique that tries to improve the QoS perceived by a user when surfing the web. Previous studies show that the cost of an effective hit rate is qu...
David Larrabeiti, Ricardo Larrabeiti, Manuel Urue&...
MATA
2004
Springer
115views Communications» more  MATA 2004»
14 years 2 months ago
AgentViz: A Visualization System for Mobile Agents
Although inexpensive, high performance computer graphics hardware has become commonly available, its application in the mobile agent and networking fields has thus far been limite...
Ken Deeter, Son T. Vuong