Sciweavers

1362 search results - page 218 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
ICCAD
2002
IEEE
142views Hardware» more  ICCAD 2002»
15 years 11 months ago
SAT and ATPG: Boolean engines for formal hardware verification
In this survey, we outline basic SAT- and ATPGprocedures as well as their applications in formal hardware verification. We attempt to give the reader a trace trough literature and...
Armin Biere, Wolfgang Kunz
INFOCOM
2005
IEEE
15 years 8 months ago
MiNT: a miniaturized network testbed for mobile wireless research
— Most mobile wireless networking research today relies on simulations. However, fidelity of simulation results has always been a concern, especially when the protocols being st...
Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-...
KDD
1997
ACM
111views Data Mining» more  KDD 1997»
15 years 7 months ago
SIPping from the Data Firehose
When mining large databases, the data extraction problem and the interface between the database and data mining algorithm become important issues. Rather than giving a mining algo...
George H. John, Brian Lent
TON
2008
108views more  TON 2008»
15 years 2 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
INFOCOM
2007
IEEE
15 years 9 months ago
Achievable Capacity Under the Interference Temperature Model
— The Interference Temperature Model was proposed by the FCC in 2003 as a way to dynamically manage and allocate spectrum resources. It would allow unlicensed radios to sense the...
Thomas C. Clancy