Results 11 to 20 of about 1,289,066 (290)
CNNPRE: A CNN-Based Protocol Reverse Engineering Method
Given the growth in computer networks and Internet usage, the traditional network environment has evolved into a more intricate system. Many applications utilize unknown communication protocols, for which the specification documentation is not available.
Javad Garshasbi, Mehdi Teimouri
doaj +1 more source
Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks [PDF]
We initiate the study of distributed protocols over directed anonymous networks that are not necessarily strongly connected. In such networks, nodes are aware only of their incoming and outgoing edges, have no unique identity, and have no knowledge of ...
Bruck, Jehoshua +2 more
core +4 more sources
Real-life performance of protocol combinations for wireless sensor networks [PDF]
Wireless sensor networks today are used for many and diverse applications like nature monitoring, or process and wireless building automation. However, due to the limited access to large testbeds and the lack of benchmarking standards, the real-life ...
De Poorter, Eli +4 more
core +2 more sources
Enhanced Logical Representations of a Real Network Based on an Algebraic Model
The algebraic model and logical representations of a real network are important but very challenging issues in automatic network verification. In this paper, we abstract the concrete network to its corresponding abstract graph with enhanced vertices and ...
Yi Pan, Suixiang Gao, Wenguo Yang
doaj +1 more source
Designing Network Protocols for Good Equilibria [PDF]
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol to optimize the equilibrium behavior of a network with selfish users.
Chen, Ho-Lin +2 more
core +1 more source
Protocols for Packet Quantum Network Intercommunication
A quantum network, which involves multiple parties pinging each other with quantum messages, could revolutionize communication, computing, and basic sciences.
Nengkun Yu, Ching-Yi Lai, Li Zhou
doaj +1 more source
BSBI – a Simple Protocol for Remote Verification of Identity
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules.
Tomasz Pałka, Adam Kozakiewicz
doaj +1 more source
Mechanizing a Process Algebra for Network Protocols [PDF]
This paper presents the mechanization of a process algebra for Mobile Ad hoc Networks and Wireless Mesh Networks, and the development of a compositional framework for proving invariant properties.
Bourke, Timothy +2 more
core +5 more sources
1991 and networked interoperability
1991, the year of the first call in the Libraries Programme, was a very different time; the network infrastructure was being built, computers were becoming more powerful, and the information society was being formed based on different technological ...
Birte Christensen-Dalsgaard
doaj +1 more source
Marine Network Protocols and Security Risks
Marine network protocols are domain-specific network protocols that aim to incorporate particular features within the specialized marine context that devices are implemented in.
Ky Tran +3 more
doaj +1 more source

