Sciweavers

7329 search results - page 328 / 1466
» Network Extractor Protocols
Sort
View
112
Voted
RAID
2009
Springer
15 years 11 months ago
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
Abstract. Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures ...
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, ...
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 11 months ago
Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs
— In mobile ad hoc networks (MANETs), packets hop from a source to a series of forwarding nodes until they reach the desired destination. Defining the hop length to be the dista...
Chuan Heng Foh, Juki Wirawan Tantra, Jianfei Cai, ...
122
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
On Optimal Physical Carrier Sensing: Theoretical Analysis and Protocol Design
— Traditional Physical Carrier Sensing (PCS), which aims at eliminating hidden terminals in wireless networks, causes too many exposed terminals and deteriorates the throughput p...
Yanfeng Zhu, Qian Zhang, Zhisheng Niu, Jing Zhu
AINA
2005
IEEE
15 years 10 months ago
Fault-Tolerant Group Membership Protocols Using Physical Robot Messengers
In this paper, we consider a distributed system that consists of a group of teams of worker robots that rely on physical robot messengers for the communication between the teams. ...
Rami Yared, Xavier Défago, Takuya Katayama
DSN
2004
IEEE
15 years 8 months ago
Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java Serialization
The goal of this paper is to assess the value of simple features that are widely available in off-the-shelf CORBA and Java platforms for the implementation of faulttolerance mecha...
Taha Bennani, Laurent Blain, Ludovic Courtè...