Sciweavers

1123 search results - page 123 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ESORICS
2007
Springer
15 years 10 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
120
Voted
OTM
2009
Springer
15 years 11 months ago
Parallel Interconnection of Broadcast Systems with Multiple FIFO Channels
This paper proposes new protocols for the interconnection of FIFO- and causal-ordered broadcast systems, thus increasing their scalability. They use several interconnection links b...
Rubén de Juan-Marín, Vicent Cholvi, ...
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
15 years 9 months ago
Evolution of Planning for Wireless Communication Systems
In this paper we provide a detailed and comprehensive survey of proposed approaches for network design, charting the evolution of models and techniques for the automatic planning ...
Roger M. Whitaker, Steve Hurley
VTC
2010
IEEE
242views Communications» more  VTC 2010»
15 years 2 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...
FMCO
2005
Springer
173views Formal Methods» more  FMCO 2005»
15 years 10 months ago
Cluster-Based LTL Model Checking of Large Systems
Abstract. In recent years a bundle of parallel and distributed algorithms for verification of finite state systems has appeared. We survey distributed-memory enumerative LTL mode...
Jiri Barnat, Lubos Brim, Ivana Cerná