Sciweavers

382 search results - page 37 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 2 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ICW
2005
IEEE
178views Communications» more  ICW 2005»
15 years 7 months ago
Adding Multi-Class Routing into the DiffServ Architecture
- To alleviate the problem of high priority traffic hogging of all the available network capacity and to optimize the network traffic in the DiffServ network, we introduce the mult...
Yin Wang, Raimo Kantola, Shuping Liu
CBSE
2005
Springer
15 years 7 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
96
Voted
ADHOC
2010
123views more  ADHOC 2010»
15 years 1 months ago
An analysis of the lifetime of OLSR networks
The Optimized Link State Routing (OLSR) protocol is a well-known route discovery protocol for ad-hoc networks. OLSR optimizes the flooding of link state information through the ne...
Jan-Maarten Verbree, Maurits de Graaf, Johann Huri...
RTAS
2005
IEEE
15 years 7 months ago
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks
— Denial-of-service attacks are becoming more frequent and sophisticated. Researchers have proposed a variety of defenses, including better system configurations, infrastructure...
V. Krishna Nandivada, Jens Palsberg