Sciweavers

1123 search results - page 102 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
IAJIT
2010
166views more  IAJIT 2010»
15 years 2 months ago
Specification and Prototyping of Reactive Distributed Systems with Algebraic Term Nets
: The specification of the dynamic behaviour of reactive distributed systems must exhibit the structures of control and has to imply explicitly the relevant aspects of the distribu...
Faiza Bouchoul, Mohamed Mostefai
ENTCS
2006
134views more  ENTCS 2006»
15 years 4 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
OSDI
2000
ACM
15 years 5 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
DFT
2003
IEEE
145views VLSI» more  DFT 2003»
15 years 9 months ago
System-Level Analysis of Fault Effects in an Automotive Environment
In the last years, new requirements in terms of vehicle performance increased significantly the amount of on-board electronics, thus raising more concern about safety and fault to...
Fulvio Corno, S. Tosato, P. Gabrielli
FAST
2008
15 years 6 months ago
TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions
TierStore is a distributed filesystem that simplifies the development and deployment of applications in challenged network environments, such as those in developing regions. For e...
Michael J. Demmer, Bowei Du, Eric A. Brewer