Sciweavers

1362 search results - page 153 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
CSMR
2009
IEEE
15 years 8 months ago
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis
Creating accurate models of information systems is an important but challenging task. It is generally well understood that such modeling encompasses general scientific issues, bu...
Ulrik Franke, Pontus Johnson, Robert Lagerströ...
ICICS
2003
Springer
15 years 8 months ago
A Policy Based Framework for Access Control
This paper presents a policy-based framework for managing access control in distributed heterogeneous systems. This framework is based on the PDP/PEP approach. The PDP (Policy Deci...
Ricardo Nabhen, Edgard Jamhour, Carlos Maziero
SIGCOMM
2010
ACM
15 years 3 months ago
R3: resilient routing reconfiguration
Network resiliency is crucial to IP network operations. Existing techniques to recover from one or a series of failures do not offer performance predictability and may cause serio...
Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Y...
134
Voted
EUROPAR
2007
Springer
15 years 9 months ago
Virtualization Techniques in Network Emulation Systems
The continuous increase of computational power has made viable the implementation of more and more sophisticated virtualization techniques. The use of virtualization in cluster env...
Roberto Canonico, Pasquale Di Gennaro, Vittorio Ma...
141
Voted
WD
2010
15 years 1 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla