Sciweavers

2234 search results - page 64 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
USS
2010
14 years 9 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
HICSS
1997
IEEE
151views Biometrics» more  HICSS 1997»
15 years 3 months ago
Intelligent Agent Based Contract Process in Electronic Commerce: UNIK-AGENT Approach
As the second generation of electronic commerce, the framework of agent based commerce is proposed. Since the communication messages and solution methods of agents are significant...
Jae Kyu Lee, Woongkyu Lee
WEBI
2007
Springer
15 years 5 months ago
Layers and Hierarchies in Real Virtual Networks
The virtual world is comprised of data items related to each other in a variety of contexts. Often such relations can be represented as graphs that evolve over time. Examples incl...
Olga Goussevskaia, Michael Kuhn 0002, Roger Watten...
SAB
2010
Springer
237views Optimization» more  SAB 2010»
14 years 9 months ago
BeeIP: Bee-Inspired Protocol for Routing in Mobile Ad-Hoc Networks
We introduce a new bee-inspired routing protocol for mobile ad hoc networks. Emphasis is given to the ability of bees to evaluate paths by considering several quality factors. In o...
Alexandros Giagkos, Myra S. Wilson
INFOCOM
2000
IEEE
15 years 3 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....