Sciweavers

382 search results - page 17 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
15 years 6 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
IPSN
2010
Springer
15 years 6 months ago
Routing without routes: the backpressure collection protocol
Current data collection protocols for wireless sensor networks are mostly based on quasi-static minimum-cost routing trees. We consider an alternative, highly-agile approach calle...
Scott Moeller, Avinash Sridharan, Bhaskar Krishnam...
91
Voted
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas
— Many MAC sub-layer protocols for supporting the usage of directional antennas in ad hoc networks have been proposed in literature. However, there remain two open issues that ar...
Gentian Jakllari, Wenjie Luo, Srikanth V. Krishnam...
118
Voted
CORR
2004
Springer
142views Education» more  CORR 2004»
14 years 11 months ago
Dynamic Localization Protocols for Mobile Sensor Networks
The ability of a sensor node to determine its physical location within a network (Localization) is of fundamental importance in sensor networks. Interpretating data from sensors i...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
100
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 5 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...