Sciweavers

1123 search results - page 100 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
15 years 4 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
FORTE
2008
15 years 5 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
MOBICOM
2003
ACM
15 years 9 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
WSC
1997
15 years 5 months ago
On the Effect and Control of Self-Similar Network Traffic: A Simulation Perspective
This paper presents a discussion of simulation-related issues arising in the study of self-similar network traffic with respect to its effect and control. Selfsimilar traffic has...
Kihong Park
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002