Sciweavers

483 search results - page 1 / 97
» Patterns of Protocols
Sort
View
ICDCS
2005
IEEE
13 years 10 months ago
Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout
We propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossipbased protocol using adaptive fanout. We model three versions of go...
Satish Verma, Wei Tsang Ooi
CCS
2008
ACM
13 years 7 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
EEE
2005
IEEE
13 years 10 months ago
A Pattern Language for Decentralized Coordination and Negotiation Protocols
Currently negotiation covers a huge and unstructured domain of negotiation- and coordination protocols and associated strategies. Researchers and practitioners like system enginee...
Adrian Paschke, Christine Kiss, Samer Al-Hunaty
CAISE
2006
Springer
13 years 8 months ago
Mediation Patterns for Message Exchange Protocols
Abstract. Systems interact with their environment (e.g., other systems) by exchanging messages in a particular order. Interoperability problems arise when systems do not understand...
Stanislav Pokraev, Manfred Reichert
JCIT
2010
161views more  JCIT 2010»
12 years 12 months ago
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching
With the development of high-speed network technique and increasing volume of network traffic, traditional pattern matching method can't adapt to the new challenges to intrus...
Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao