Sciweavers

1123 search results - page 115 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 8 months ago
A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks
Satellite communication systems exhibit important and unique features that qualify them to be an integral part of a global ubiquitous information system. Given the universality of ...
Tarik Taleb, Kazuo Hashimoto, Nei Kato, Yoshiaki N...
TROB
2008
159views more  TROB 2008»
15 years 4 months ago
Distributed Connectivity Control of Mobile Networks
Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile senso...
Michael M. Zavlanos, George J. Pappas
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 10 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
CBSE
2008
Springer
15 years 6 months ago
State Space Reduction Techniques for Component Interfaces
Abstract. Automata-based interface and protocol specifications provide an elegant framework to capture and automatically verify the interactive behavior of component-based software...
Markus Lumpe, Lars Grunske, Jean-Guy Schneider
ICDCSW
2007
IEEE
15 years 10 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar