Sciweavers

1581 search results - page 202 / 317
» Mechanizing Inductive Reasoning
Sort
View
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
15 years 9 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
IEEEARES
2006
IEEE
15 years 9 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
15 years 8 months ago
TPA: A Transport Protocol for Ad Hoc Networks
Several previous works have shown that TCP exhibits poor performance in Mobile Ad Hoc Networks (MANETs). The ultimate reason for this is that MANETs behave in a significantly diff...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
ISCC
2005
IEEE
15 years 8 months ago
Traffic Engineering in Multihomed Sites
It is expected that IPv6 multihomed sites will obtain as many global prefixes as direct providers they have, so Traffic Engineering techniques currently used in IPv4 multihomed si...
Marcelo Bagnulo, Alberto García-Martí...
LICS
2005
IEEE
15 years 8 months ago
Generalizing Parametricity Using Information-flow
Run-time type analysis allows programmers to easily and concisely define operations based upon type structure, such as serialization, iterators, and structural equality. However,...
Geoffrey Washburn, Stephanie Weirich