Sciweavers

1123 search results - page 94 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
HASE
1998
IEEE
15 years 8 months ago
A Firewalling Scheme for Securing MPOA-Based Enterprise Networks
A well-known security problem with MPOA is that cutthrough connections generally bypasses firewall routers if there are any. None of the previously proposed approaches solved the ...
Jun Xu, Mukesh Singhal
CMSB
2011
Springer
14 years 4 months ago
The singular power of the environment on stochastic nonlinear threshold Boolean automata networks
Abstract. This paper tackles theoretically the question of the structural stability of biological regulation networks subjected to the influence of their environment. The model of...
Jacques Demongeot, Sylvain Sené
EATIS
2007
ACM
15 years 8 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
WOWMOM
2009
ACM
158views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Opportunistic scanning: Interruption-free network topology discovery for wireless mesh networks
This paper presents the concept and preliminary performance evaluation of a stochastic network discovery approach named opportunistic scanning. Therein, a station only pauses its ...
Marc Emmelmann, Sven Wiethoelter, Hyung-Taek Lim
IPSN
2004
Springer
15 years 9 months ago
Constraint-guided dynamic reconfiguration in sensor networks
This paper presents an approach for dynamic software reconfiguration in sensor networks. Our approach utilizes explicit models of the design space of the embedded application. The...
Sachin Kogekar, Sandeep Neema, Brandon Eames, Xeno...