Sciweavers

1321 search results - page 134 / 265
» Logic Simulation Using Networks of State Machines
Sort
View
TMC
2012
13 years 10 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
SIGCOMM
2005
ACM
15 years 3 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
TC
1998
14 years 9 months ago
Abstraction Techniques for Validation Coverage Analysis and Test Generation
ion Techniques for Validation Coverage Analysis and Test Generation Dinos Moundanos, Jacob A. Abraham, Fellow, IEEE, and Yatin V. Hoskote —The enormous state spaces which must be...
Dinos Moundanos, Jacob A. Abraham, Yatin Vasant Ho...
ISCC
2006
IEEE
15 years 4 months ago
An Optimized Peer-to-Peer Overlay Network for Service Discovery
In this paper, we propose DINPeer, an optimized peer-to-peer (P2P) overlay network for service discovery by overcoming limitations in current multicast discovery approaches and P2...
H. Q. Guo, D. Q. Zhang, Lek Heng Ngoh, Wai-Choong ...
FMSD
2006
131views more  FMSD 2006»
14 years 10 months ago
Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude
This paper describes the application of the Real-Time Maude tool and the Maude formal methodology to the specification and analysis of the AER/NCA suite of active network multicast...
Peter Csaba Ölveczky, José Meseguer, C...