Sciweavers

84 search results - page 12 / 17
» Automated Packet Trace Analysis of TCP Implementations
Sort
View
89
Voted
INFOCOM
2006
IEEE
15 years 5 months ago
On the Sensitivity of Online Game Playing Time to Network QoS
Abstract— Online gaming is one of the most profitable businesses on the Internet. Among various threats to continuous player subscriptions, network lags are particularly notorio...
Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Y...
EUROSYS
2007
ACM
15 years 8 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
LOPSTR
2001
Springer
15 years 4 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
TON
2010
159views more  TON 2010»
14 years 6 months ago
Googling the internet: profiling internet endpoints via the world wide web
Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
ISSTA
2010
ACM
15 years 1 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...