Sciweavers

PAM
2012
Springer
12 years 12 days ago
Xunlei: Peer-Assisted Download Acceleration on a Massive Scale
Abstract. We take a close look at Xunlei, an enormously popular download acceleration application in China. Xunlei forms a complex ecosystem, with Xunlei peers extensively interact...
Prithula Dhungel, Keith W. Ross, Moritz Steiner, Y...
JCIT
2010
161views more  JCIT 2010»
12 years 11 months ago
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching
With the development of high-speed network technique and increasing volume of network traffic, traditional pattern matching method can't adapt to the new challenges to intrus...
Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao
AIEDAM
2004
96views more  AIEDAM 2004»
13 years 4 months ago
Learning while designing
: This paper reports on preliminary results of an explorative study of a protocol analysis of team learning while designing using in-situ data. Two measurement-based frameworks are...
Gourabmoy Nath, John S. Gero
ENTCS
2006
145views more  ENTCS 2006»
13 years 4 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
IANDC
2008
105views more  IANDC 2008»
13 years 4 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
ESOP
2004
Springer
13 years 10 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
ESEM
2009
ACM
13 years 11 months ago
Cognitive factors in perspective-based reading (PBR): A protocol analysis study
The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the proto...
Bryan Robbins, Jeff Carver