Sciweavers

3528 search results - page 598 / 706
» A New Approach to Planning in Networks
Sort
View
CAV
2010
Springer
154views Hardware» more  CAV 2010»
15 years 1 months ago
Verifying Low-Level Implementations of High-Level Datatypes
For efficiency and portability, network packet processing code is typically written in low-level languages and makes use of bit-level operations to compactly represent data. Althou...
Christopher L. Conway, Clark Barrett
FMICS
2006
Springer
15 years 1 months ago
Model-Based Testing of a WAP Gateway: An Industrial Case-Study
Abstract. We present experiences from a case study where a model-based approach to black-box testing is applied to verify that a Wireless Application Protocol (WAP) gateway conform...
Anders Hessel, Paul Pettersson
CCS
2008
ACM
14 years 12 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
CONEXT
2008
ACM
14 years 11 months ago
Advantages of a PCE-based control plane for LISP
The Locator/Identifier Separation Protocol (LISP) is one of the candidate solutions to address the scalability issues in inter-domain routing. The current proposals for its contro...
Alberto Castro, Martín Germán, Xavie...
ICWSM
2008
14 years 11 months ago
Competing to Share Expertise: The Taskcn Knowledge Sharing Community
"Witkeys" are websites in China that form a rapidly growing web-based knowledge market. A user who posts a task also offers a small fee, and many other users submit thei...
Jiang Yang, Lada A. Adamic, Mark S. Ackerman