Sciweavers

1362 search results - page 168 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
167
Voted
INFOCOM
2008
IEEE
15 years 9 months ago
Swarming on Optimized Graphs for n-Way Broadcast
—In an n-way broadcast application each one of n overlay nodes wants to push its own distinct large data file to all other n-1 destinations as well as download their respective ...
Georgios Smaragdakis, Azer Bestavros, Nikolaos Lao...
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
MOBIHOC
2008
ACM
16 years 2 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
GLOBECOM
2006
IEEE
15 years 9 months ago
On the Throughput-Cost Tradeoff of Multi-Tiered Optical Network Architectures
— In this work, we conduct a throughput-cost study of several optical network architectures: Optical Flow Switching (OFS), Tell-and-Go (TaG), Electronic Packet Switching (EPS), a...
Guy Weichenberg, Vincent W. S. Chan, Muriel M&eacu...
ICNP
2006
IEEE
15 years 9 months ago
Internet Cache Pollution Attacks and Countermeasures
Abstract— Proxy caching servers are widely deployed in today’s Internet. While cooperation among proxy caches can significantly improve a network’s resilience to denial-of-s...
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan C...