Protocol analysis

Results: 1021



#Item
61Modular Verification of Feature-Oriented Software Models Kathi Fisler Department of Computer Science Worcester Polytechnic Institute Worcester, MA, 01609 USA

Modular Verification of Feature-Oriented Software Models Kathi Fisler Department of Computer Science Worcester Polytechnic Institute Worcester, MA, 01609 USA

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2002-11-13 14:10:53
62TravelBus 2 in 1 Analyzer (Protocol & Logic) • PC-based, USB 3.0 interface/powered • 200 MHz timing/state analysis • Digital channels : 16 (Data), 1 (Clock), 2 (I²C) • Memory : PC RAM

TravelBus 2 in 1 Analyzer (Protocol & Logic) • PC-based, USB 3.0 interface/powered • 200 MHz timing/state analysis • Digital channels : 16 (Data), 1 (Clock), 2 (I²C) • Memory : PC RAM

Add to Reading List

Source URL: www.acute.com.tw

Language: English - Date: 2016-01-18 04:17:34
63Systematic review / Meta-analysis / Evidence-based practices / Academic publishing / Epidemiology / Preferred Reporting Items for Systematic Reviews and Meta-Analyses / Publication bias / Reporting bias / Communications protocol

PRISMA-P 2015 Checklist This checklist has been adapted for use with protocol submissions to Systematic Reviews from Table 3 in Moher D et al: Preferred reporting items for systematic review and meta-analysis protocols

Add to Reading List

Source URL: www.prisma-statement.org

Language: English - Date: 2016-01-22 16:43:13
64Paving the Way for NFV: Simplifying Middlebox Modifications using StateAlyzr Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella University of Wisconsin-Madison Abstract

Paving the Way for NFV: Simplifying Middlebox Modifications using StateAlyzr Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella University of Wisconsin-Madison Abstract

Add to Reading List

Source URL: opennf.cs.wisc.edu

Language: English - Date: 2016-02-29 22:59:54
65A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N.P. Smart and B. Warinschi Abstract We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement

A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N.P. Smart and B. Warinschi Abstract We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-06-02 08:20:40
    66NAP: a Building Block for Remediating Performance Bottlenecks via Black Box Network Analysis ∗ Muli Ben-Yehuda  David Breitgand

    NAP: a Building Block for Remediating Performance Bottlenecks via Black Box Network Analysis ∗ Muli Ben-Yehuda David Breitgand

    Add to Reading List

    Source URL: www.mulix.org

    Language: English
    67Design and Analysis of Sectrace: A Protocol to Set up Security Associations and Policies in IPSec Networks∗ Alwyn Goodloe University of Pennsylvania

    Design and Analysis of Sectrace: A Protocol to Set up Security Associations and Policies in IPSec Networks∗ Alwyn Goodloe University of Pennsylvania

    Add to Reading List

    Source URL: seclab.illinois.edu

    Language: English - Date: 2011-06-08 17:58:15
      68MRC/CSO Social and Public Health Sciences Unit  Systematic Review Protocol DecemberAssessing reporting of narrative

      MRC/CSO Social and Public Health Sciences Unit Systematic Review Protocol DecemberAssessing reporting of narrative

      Add to Reading List

      Source URL: www.sphsu.mrc.ac.uk

      Language: English
      69A machine learning-based protocol for docking results analysis Sabina Smusz,1,2 Stefan Mordalski,1 Jagna Witek,1 Krzysztof Rataj,1 Andrzej J. Bojarski1 1 1Department

      A machine learning-based protocol for docking results analysis Sabina Smusz,1,2 Stefan Mordalski,1 Jagna Witek,1 Krzysztof Rataj,1 Andrzej J. Bojarski1 1 1Department

      Add to Reading List

      Source URL: www.int-conf-chem-structures.org

      Language: English - Date: 2014-07-07 14:26:57
        70SecRetProbabilistic Modeling and Analysis of DoS Protection for the ASV Protocol Musab AlTurki1 Jos´e Meseguer2 Carl A. Gunter Department of Computer Science

        SecRetProbabilistic Modeling and Analysis of DoS Protection for the ASV Protocol Musab AlTurki1 Jos´e Meseguer2 Carl A. Gunter Department of Computer Science

        Add to Reading List

        Source URL: seclab.illinois.edu

        Language: English - Date: 2011-03-29 17:01:08