Sciweavers

1123 search results - page 49 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
AINA
2006
IEEE
15 years 5 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
SRDS
2003
IEEE
15 years 5 months ago
Group Communication Protocols under Errors
Group communication protocols constitute a basic building block for highly dependable distributed applications. Designing and correctly implementing a group communication system (...
Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ra...
FAC
2008
97views more  FAC 2008»
14 years 12 months ago
A functional formalization of on chip communications
This paper presents a formal model and a systematic approach to the validation of communication tures at a high level of abstraction. This model is described mathematically by a fu...
Julien Schmaltz, Dominique Borrione
TON
2010
80views more  TON 2010»
14 years 10 months ago
Replication routing in DTNs: a resource allocation approach
—Routing protocols for disruption-tolerant networks (DTNs) use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and netwo...
Aruna Balasubramanian, Brian Neil Levine, Arun Ven...
FMSD
2006
103views more  FMSD 2006»
14 years 11 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol