Sciweavers

4998 search results - page 127 / 1000
» The case for intentional networking
Sort
View
TIT
2011
128views more  TIT 2011»
14 years 4 months ago
Secure Network Coding on a Wiretap Network
—In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the netw...
Ning Cai, Raymond W. Yeung
ASIASIM
2004
Springer
15 years 3 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
INFOCOM
1993
IEEE
15 years 2 months ago
Queueing Delays in Rate Controlled ATM Networks
This paper addresses the problem of finding the worst case end-to-end delay and buffer occupancy bounds in ATM networks with rate-controlled, non-work conserving servers. A theore...
Anindo Banerjea, Srinivasan Keshav
FATES
2006
Springer
15 years 1 months ago
A Test Calculus Framework Applied to Network Security Policies
Abstract. We propose a syntax-driven test generation technique to auly derive abstract test cases from a set of requirements expressed in a linear temporal logic. Assuming that an ...
Yliès Falcone, Jean-Claude Fernandez, Laure...
GLOBECOM
2009
IEEE
15 years 4 months ago
P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks
—Several proposals on P2P-ISP cooperation have recently been developed using information sharing for localitybased peering. Their benefits in terms of P2P efficiency, ISP cost,...
Aliye Özge Kaya, Mung Chiang, Wade Trappe