Sciweavers

7329 search results - page 15 / 1466
» Network Extractor Protocols
Sort
View
53
Voted
ICNP
1995
IEEE
15 years 1 months ago
A protocol synthesis algorithm: a relational approach
Kacem Zeroual, M. El Yassini
ISAS
2005
Springer
15 years 2 months ago
Characterizing Session Initiation Protocol (SIP) Network Performance and Reliability
— The Session Initiation Protocol (SIP) has emerged as the preferred Internet telephony signaling protocol for communications networks. In this capacity, it becomes increasingly ...
Vijay K. Gurbani, Lalita Jagadeesan, Veena B. Mend...
GLOBECOM
2009
IEEE
15 years 4 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...
PST
2004
14 years 10 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean