Sciweavers

1362 search results - page 193 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
ICAI
2004
15 years 4 months ago
Evaluation of an Agent-Mediated Social Network
The goal of this work is to design and implement an agent-based system that facilitates interaction among a group of individuals who are part of an organization, observe types and...
Taneem Ibrahim, Aaron Arthurs, Henry Hexmoor
CONEXT
2009
ACM
15 years 4 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 3 months ago
Deploying Wireless Networks with Beeps
Abstract. We present the discrete beeping communication model, which assumes nodes have minimal knowledge about their environment and severely limited communication capabilities. S...
Alejandro Cornejo, Fabian Kuhn
PERCOM
2011
ACM
14 years 10 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
JNSM
2010
110views more  JNSM 2010»
14 years 10 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...