Sciweavers

3751 search results - page 570 / 751
» Events in security protocols
Sort
View
SIGCOMM
2006
ACM
15 years 6 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
93
Voted
APSEC
2005
IEEE
15 years 6 months ago
Consistency and Interoperability Checking for Component Interaction Rules
In component-based software development, it is important to ensure interoperability between components based on their unambiguous semantic descriptions, in order to obtain a viabl...
Yan Jin, Jun Han
NOMS
2002
IEEE
130views Communications» more  NOMS 2002»
15 years 5 months ago
End-to-end service failure diagnosis using belief networks
We present fault localization techniques suitable for diagnosing end-to-end service problems in communication systems with complex topologies. We refine a layered system model th...
Malgorzata Steinder, Adarshpal S. Sethi
PCI
2009
Springer
15 years 5 months ago
Query Sensitive Storage for Wireless Sensor Networks
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Alexis Papadimitriou, Dimitrios Katsaros, Yannis M...
DSRT
2008
IEEE
15 years 2 months ago
Evaluating Large Scale Distributed Simulation of P2P Networks
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems...
Tien Tuan Anh Dinh, Georgios K. Theodoropoulos, Ro...