Sciweavers

3901 search results - page 767 / 781
» software 2008
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 1 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
RECONFIG
2008
IEEE
225views VLSI» more  RECONFIG 2008»
14 years 1 months ago
A Hardware Filesystem Implementation for High-Speed Secondary Storage
Platform FPGAs are capable of hosting entire Linuxbased systems including standard peripherals, integrated network interface cards and even disk controllers on a single chip. File...
Ashwin A. Mendon, Ron Sass
SECON
2008
IEEE
14 years 1 months ago
TCP Performance in Coded Wireless Mesh Networks
This paper investigates the benefit of network coding for TCP traffic in a wireless mesh network. We implement network coding in a real wireless mesh network and measure TCP thr...
Yong Huang, Majid Ghaderi, Donald F. Towsley, Weib...
TRIDENTCOM
2008
IEEE
14 years 1 months ago
Performance analysis of a lightweight NEMO implementation for low-end devices
IETF Network Mobility (NEMO) Basic Support Protocol is an IP mobility management protocol designed to provide seamless IP mobility to complete networks. This protocol is of crucia...
J. L. Almodovar, Antonio de la Oliva, C. Lazo Ram,...