Sciweavers

1123 search results - page 51 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ITIIS
2010
192views more  ITIIS 2010»
14 years 10 months ago
Large-Scale Integrated Network System Simulation with DEVS-Suite
Formidable growth of Internet technologies has revealed challenging issues about its scale and performance evaluation. Modeling and simulation play a central role in the evaluatio...
Ahmet Zengin
IFIP
2007
Springer
15 years 6 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
WISTP
2010
Springer
15 years 6 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
ICOIN
2001
Springer
15 years 4 months ago
A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs
According to the progress of high-speed networks, many communication protocols are specified as concurrent systems. Such systems can be modeled as concurrent deterministic FSMs (D...
Atsushi Fukada, Akio Nakata, Junji Kitamichi, Teru...
WIMOB
2008
IEEE
15 years 6 months ago
Multi-hop Cross-Layer Design in Wireless Sensor Networks: A Case Study
—Cross-layer design has been proposed as a promising paradigm to tackle various problems of wireless communication systems. Recent research has led to a variety of protocols that...
Philipp Hurni, Torsten Braun, Bharat K. Bhargava, ...