Sciweavers

1362 search results - page 209 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
ECAI
2006
Springer
15 years 6 months ago
Environment-Driven Skeletal Plan Execution for the Medical Domain
An important application of both data abstraction and plan execution is the execution of clinical guidelines and protocols (CGP), both to validate them against a large set of test ...
Peter Votruba, Andreas Seyfang, Michael Paesold, S...
DAIS
2009
15 years 4 months ago
Exploiting Synergies between Coexisting Overlays
Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become...
Shen Lin 0003, François Taïani, Gordon...
TON
2002
138views more  TON 2002»
15 years 2 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
SENSYS
2010
ACM
15 years 26 days ago
sMAP: a simple measurement and actuation profile for physical information
As more and more physical information becomes available, a critical problem is enabling the simple and efficient exchange of this data. We present our design for a simple RESTful ...
Stephen Dawson-Haggerty, Xiaofan Jiang, Gilman Tol...
TSE
2010
230views more  TSE 2010»
14 years 9 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...